## Cryptology ePrint Archive: Report 2021/1262

Reverse Firewalls for Adaptively Secure MPC without Setup

Suvradip Chakraborty and Chaya Ganesh and Mahak Pancholi and Pratik Sarkar

Abstract: We study Multi-party computation (MPC) in the setting of subversion, where the adversary tampers with the machines of honest parties. Our goal is to construct actively secure MPC protocols where parties are corrupted adaptively by an adversary (as in the standard adaptive security setting), and in addition, honest parties' machines are compromised. The idea of reverse firewalls (RF) was introduced at EUROCRYPT'15 by Mironov and Stephens-Davidowitz as an approach to protecting protocols against corruption of honest parties' devices. Intuitively, an RF for a party $\mathcal{P}$ is an external entity that sits between $\mathcal{P}$ and the outside world and whose scope is to sanitize $\mathcal{P}$’s incoming and outgoing messages in the face of subversion of their computer. Mironov and Stephens-Davidowitz constructed a protocol for passively-secure two-party computation. At CRYPTO'20, Chakraborty, Dziembowski and Nielsen constructed a protocol for secure computation with firewalls that improved on this result, both by extending it to multi-party computation protocol, and considering active security in the presence of static corruptions. In this paper, we initiate the study of RF for MPC in the adaptive setting. We put forward a definition for adaptively secure MPC in the reverse firewall setting, explore relationships among the security notions, and then construct reverse firewalls for MPC in this stronger setting of adaptive security. We also resolve the open question of Chakraborty, Dziembowski and Nielsen by removing the need for a trusted setup in constructing RF for MPC. Towards this end, we construct reverse firewalls for adaptively secure augmented coin tossing and adaptively secure zero-knowledge protocols and obtain a constant round adaptively secure MPC protocol in the reverse firewall setting without setup. Along the way, we propose a new multi-party adaptively secure coin tossing protocol in the plain model, that is of independent interest.

Category / Keywords: cryptographic protocols / Subversion, reverse firewalls, multi-party computation, adaptive security, coin tossing

Original Publication (with minor differences): IACR-ASIACRYPT-2021

Date: received 21 Sep 2021, last revised 22 Sep 2021

Contact author: suvradip1111 at gmail com, chaya at iisc ac in, mahakp at cs au dk, pratik93 at bu edu

Available format(s): PDF | BibTeX Citation

Short URL: ia.cr/2021/1262

[ Cryptology ePrint archive ]