Designing fully secure protocols for secure two-party computation of constant-domain functions
Designing fully secure protocols for secure two-party computation of constant-domain functions
Citació
- Daza V, Makriyannis N. Designing fully secure protocols for secure two-party computation of constant-domain functions. In: Kalai Y, Reyzin L, editors. Theory of Cryptography. TCC 2017; 2017 Nov 12-5; Baltimore, USA. Berlin: Springer; 2017. p. 581-611. (LNCS; no. 10677). DOI: 10.1007/978-3-319-70500-2_20
Enllaç permanent
Descripció
Resum
In a sense, a two-party protocol achieves fairness if the output from the computation is obtained simultaneously by both parties. A seminal result by Cleve (STOC 1986) states that fairness is impossible, in general. Surprisingly, Gordon et al. (JACM 2011) showed that there exist interesting functions that are computable with fairness. The two results give rise to a distinction between fair functions and unfair ones. The question of characterizing these functions has been studied in a sequence of works leading to the complete characterization of (symmetric) Boolean functions by Asharov et al. (TCC 2015). In this paper, we design new fully secure protocols for functions that were previously unknown to be fair. To this end, our main technical contribution is a generic construction of a fully secure (fair) protocol, starting with a constant-round protocol satisfying limited security requirements. Our construction introduces new conceptual tools for the analysis of fairness that apply to arbitrary (constant-domain) functions. While the characterization remains open, we believe that our results lay the foundation for a deeper understanding of fairness.Descripció
Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, celebrada a Baltimore (Estats Units d'Amèrica) del 12 al 15 de novembre de 2017.