Abstract
Auditing a secure multiparty computation (MPC) protocol entails the validation of the protocol transcript by a third party that is otherwise untrusted. In this work we introduce the concept of end-to-end verifiable MPC (VMPC), that requires the validation to provide a correctness guarantee even in the setting that all servers, trusted setup primitives and all the client systems utilized by the input-providing users of the MPC protocol are subverted by an adversary. To instantiate VMPC, we introduce a new concept in the setting of zero-knowlegde protocols that we term crowd verifiable zero-knowledge (CVZK). A CVZK protocol enables a prover to convince a set of verifiers about a certain statement, even though each one individually contributes a small amount of entropy for verification and some of them are adversarially controlled. Given CVZK, we present a VMPC protocol that is based on discrete-logarithm related assumptions. At the high level of adversity that VMPC is meant to withstand, it is infeasible to ensure perfect correctness, thus we investigate the classes of functions and verifiability relations that are feasible in our framework, and present a number of possible applications the underlying functions of which can be implemented via VMPC.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – ASIACRYPT 2020 |
Editors | Shiho Moriai, Huaxiong Wang |
Publisher | Springer |
Pages | 717-748 |
Number of pages | 32 |
ISBN (Electronic) | 978-3-030-64840-4 |
ISBN (Print) | 978-3-030-64839-8 |
DOIs | |
Publication status | Published - 5 Dec 2020 |
Event | 26th Annual International Conference on the Theory and Application of Cryptology and Information Security - Online Duration: 7 Dec 2020 → 11 Dec 2020 https://asiacrypt.iacr.org/2020/ |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 12493 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 26th Annual International Conference on the Theory and Application of Cryptology and Information Security |
---|---|
Abbreviated title | ASIACRYPT 2020 |
City | Online |
Period | 7/12/20 → 11/12/20 |
Internet address |
Keywords / Materials (for Non-textual outputs)
- Cryptographic protocols
- verifiability
- privacy