...
首页> 外文期刊>Electronic Colloquium on Computational Complexity >A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
【24h】

A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation

机译:BGW协议的完整证明,用于完美安全的多方计算

获取原文
           

摘要

In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of information-theoretically secure computation was presented by Ben-Or, Goldwasser and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with emph{perfect security}, in the private channels model. When the adversary is semi-honest this holds as long as tn2 parties are corrupted, and when the adversary is malicious this holds as long as tn3 parties are corrupted. Unfortunately, a full detailed proof of these results was never given. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. We also derive corollaries for security in the presence of adaptive adversaries and under concurrent general composition (equivalently, universal composability). In addition, we give a full specification of the protocol for the malicious setting. This includes one new step for the perfect multiplication protocol in the case of n4tn3 .
机译:在设置安全多方计算中,一组具有私有输入的N个派对希望共同计算其输入的某些功能。信息理论上最基本的计算之一由1988年由Ben-Over,Goldwasser和Wigderson(BGW)提出。他们证明可以在私人中使用 EMPH {完美的安全性}来计算任何N方功能频道模型。只要TN2缔约方腐败,对手的半诚实这持有,只要TN3缔约方腐败,就会恶意恶意这种持有。不幸的是,从未给出了这些结果的完整详细证明。在本文中,我们补救了这种情况,并提供了BGW协议的完全安全证明。我们还在适应性对手的存在下以及并发一般成分(等效,通用可组合性)中获得了安全性的推导。此外,我们还提供了对恶意设置的协议的完整规范。这包括在N4TN3的情况下为完美乘法协议的一个新步骤。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号