Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-48618-0_2guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Taming Adaptivity in YOSO Protocols: The Modular Way

Published: 29 November 2023 Publication History

Abstract

YOSO-style MPC protocols (Gentry et al., Crypto’21), are a promising framework where the overall computation is partitioned into small, short-lived pieces, delegated to subsets of one-time stateless parties. Such protocols enable gaining from the security benefits provided by using a large community of participants where “mass corruption” of a large fraction of participants is considered unlikely, while keeping the computational and communication costs manageable. However, fully realizing and analyzing YOSO-style protocols has proven to be challenging: While different components have been defined and realized in various works, there is a dearth of protocols that have reasonable efficiency and enjoy full end to end security against adaptive adversaries.
The YOSO model separates the protocol design, specifying the short-lived responsibilities, from the mechanisms assigning these responsibilities to machines participating in the computation. These protocol designs must then be translated to run directly on the machines, while preserving security guarantees. We provide a versatile and modular framework for analyzing the security of YOSO-style protocols, and show how to use it to compile any protocol design that is secure against static corruptions of t out of c parties, into protocols that withstand adaptive corruption of T out of N machines (where T/N is closely related to t/c, specifically when t/c<0.5, we tolerate T/N0.29) at overall communication cost that is comparable to that of the traditional protocol even when c<<N.
Furthermore, we demonstrate how to minimize the use of costly non-committing encryption, thereby keeping the computational and communication overhead manageable even in practical terms, while still providing end to end security analysis. Combined with existing approaches for transforming stateful protocols into stateless ones while preserving static security (e.g. Gentry et al. 21, Kolby et al. 22), we obtain end to end security.

References

[1]
Acharya A, Hazay C, Kolesnikov V, and Prabhakaran M Kiltz E and Vaikuntanathan V SCALES - MPC with small clients and larger ephemeral servers TCC 2022 2022 Heidelberg Springer 502-531
[2]
Braun, L., Damgård, I., Orlandi, C.: Secure multiparty computation from threshold encryption based on class groups. Cryptology ePrint Archive, Report 2022/1437 (2022). https://eprint.iacr.org/2022/1437
[3]
Benhamouda F et al. Pass R, Pietrzak K, et al. Can a public blockchain keep a secret? Theory of Cryptography 2020 Cham Springer 260-290
[4]
Castagnos, G., Catalano, D., Laguillaumie, F., Savasta, F., Tucker, I.: Two-party ECDSA from hash proof systems and efficient instantiations. Cryptology ePrint Archive, Report 2019/503 (2019). https://eprint.iacr.org/2019/503
[5]
Cramer R, Damgård I, and Nielsen JB Pfitzmann B Multiparty computation from threshold homomorphic encryption Advances in Cryptology — EUROCRYPT 2001 2001 Heidelberg Springer 280-300
[6]
Canetti R, Dodis Y, Pass R, and Walfish S Vadhan SP Universally composable security with global setup Theory of Cryptography 2007 Heidelberg Springer 61-85
[7]
Chen J and Micali S Algorand: a secure and efficient distributed ledger Theoret. Comput. Sci. 2019 777 155-183
[8]
David B, Gaži P, Kiayias A, and Russell A Nielsen JB and Rijmen V Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain Advances in Cryptology – EUROCRYPT 2018 2018 Cham Springer 66-98
[9]
David, B., Konring, A., Ishai, Y., Kushilevitz, E., Narayanan, V.: Perfect MPC over layered graphs. Cryptology ePrint Archive, Report 2023/330 (2023). https://eprint.iacr.org/2023/330
[10]
Escala A, Herold G, Kiltz E, Ràfols C, and Villar J Canetti R and Garay JA An algebraic framework for Diffie-Hellman assumptions Advances in Cryptology – CRYPTO 2013 2013 Heidelberg Springer 129-147
[11]
Gentry C et al. Malkin T, Peikert C, et al. YOSO: you only speak once Advances in Cryptology – CRYPTO 2021 2021 Cham Springer 64-93
[12]
Gentry C, Halevi S, Magri B, Nielsen JB, and Yakoubov S Nissim K and Waters B Random-index PIR and applications Theory of Cryptography 2021 Cham Springer 32-61
[13]
Groth J, Ostrovsky R, and Sahai A New techniques for noninteractive zero-knowledge J. ACM (JACM) 2012 59 3 1-35
[14]
Huang Z, Lai J, Han S, Lyu L, and Weng J Agrawal S and Lin D Anonymous public key encryption under corruptions ASIACRYPT 2022 2022 Heidelberg Springer 423-453
[15]
Katz J, Maurer U, Tackmann B, and Zikas V Sahai A Universally composable synchronous computation Theory of Cryptography 2013 Heidelberg Springer 477-498
[16]
Kolby, S., Ravi, D., Yakoubov, S.: Constant-round YOSO MPC without setup. Cryptology ePrint Archive, Paper 2022/187 (2022). https://eprint.iacr.org/2022/187
[17]
Micali, S., Rabin, M.O., Vadhan, S.P.: Verifiable random functions. In: 40th FOCS, pp. 120–130. IEEE Computer Society Press, October 1999
[18]
Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: the non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111–126. Springer, Heidelberg (2002).

Index Terms

  1. Taming Adaptivity in YOSO Protocols: The Modular Way
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II
      Nov 2023
      473 pages
      ISBN:978-3-031-48617-3
      DOI:10.1007/978-3-031-48618-0
      • Editors:
      • Guy Rothblum,
      • Hoeteck Wee

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 29 November 2023

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Oct 2024

      Other Metrics

      Citations

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media