Distributing the Setup in Universally Composable Secure Multiparty Computation

Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Universally composable (UC) protocols retain their security properties even when run concurrently alongside arbitrary other protocols. Unfortunately, it is known that UC multiparty computation (for general functionalities, and without assuming honest majority) is impossible without some form of setup. To circumvent this impossibility, various complete setup assumptions have been proposed. With only a few exceptions, past work has viewed these setup assumptions as being implemented by some ideal, incorruptible entity. Any such entity is thus a single point of failure, and security fails catastrophically in case the setup entity is subverted by an adversary. We propose here a clean, general, and generic approach for distributing trust among m arbitrary setups, by modeling potential corruption of setups within the UC framework, where such corruption might be fail-stop, passive, or arbitrary and is in addition to possible corruption of the parties themselves. We show several feasibility and impossibility results in this model, for different specifications of the corruptible sets. For example, we show that given m complete setups, up to t of which might be actively corrupted in an adaptive manner, general multiparty computation with no honest majority is possible if and only if t < m/2.
Original languageEnglish
Title of host publicationACM Symposium on Principles of Distributed Computing, PODC '14, Paris, France, July 15-18, 2014
PublisherACM
Pages20-29
Number of pages10
ISBN (Print)978-1-4503-2944-6
DOIs
Publication statusPublished - 2014

Fingerprint

Dive into the research topics of 'Distributing the Setup in Universally Composable Secure Multiparty Computation'. Together they form a unique fingerprint.

Cite this