Skip to main content

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2384))

Included in the following conference series:

Abstract

We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than \( \frac{n} {4} \) active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure asynchronous multiparty computation among n players tolerating the adversary structure \( \mathcal{A} \) is possible if and only if the union of no four sets in the adversary structure cover the full set of players. The computation and communication complexities of the presented protocols are polynomial in the size of the maximal basis of the adversary structure. Our results generalize the results of [16,10] to the asynchronous setting. Furthermore, when restricted to the threshold setting, the protocols of this paper result in solutions as good as the best known asynchronous threshold protocols for the perfect setting. Incidentally, the problems of designing efficient asynchronous secure protocols and adapting the efficiency improvement techniques of the threshold setting to the non-threshold setting were mentioned as open in [18,17].

Financial support from Infosys Technologies Limited, India, is acknowledged.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Donald Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, pages 75–122, 1991.

    Google Scholar 

  2. Donald Beaver, Joan Feigenbaum, Joe Kilian, and Phillip Rogaway. Security with low communication overhead. In CRYPTO’ 90, pages 62–76, 1990.

    Google Scholar 

  3. Donald Beaver, Silvio Micali, and Phillip Rogaway. The round complexity of secure protocols. In Proceedings of 22nd ACM STOC, pages 503–513, 1990.

    Google Scholar 

  4. M. Ben-Or, R. Canetti, and O. Goldreich. Asynchronous secure computations. In Proceedings of 25th ACM STOC, pages 52–61, 1993.

    Google Scholar 

  5. M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of 20th ACM STOC, pages 1–10, 1988.

    Google Scholar 

  6. M. Ben-Or, B. Kelmer, and T. Rabin. Asynchronous secure computation with optimal resilience. In Proceedings of 13th ACM PODC, pages 183–192, 1994.

    Google Scholar 

  7. R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.

    Article  MATH  MathSciNet  Google Scholar 

  8. R. Canetti and T. Rabin. Optimal asynchronous byzantine agreement. In Proceedings of 25th ACM STOC, pages 42–51, 1993.

    Google Scholar 

  9. D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proceedings of 20th ACM STOC, pages 11–19, 1988.

    Google Scholar 

  10. R. Cramer, I. Damgard, and U. Maurer. Efficient general secure multiparty computation from any linear secret sharing scheme. In EUROCRYPT2000, LNCS, Springer-Verlag, 2000.

    Google Scholar 

  11. Ronald Cramer, Ivan Damgard, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT’ 99, volume 1592 of LNCS, pages 311–326, 1999.

    Google Scholar 

  12. Matthew K. Franklin and Moti Yung. Communication complexity of secure computation. In Proceedings of 24th ACM STOC, pages 699–710, 1992.

    Google Scholar 

  13. Rosario Gennaro, Micheal O. Rabin, and Tal Rabin. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In Proceedings of 17th ACM PODC, 1998.

    Google Scholar 

  14. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In 19th ACM STOC, pages 218–229. ACM Press, 1987.

    Google Scholar 

  15. M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multiparty computation. In 16th ACM PODC, pages 25–34, August 1997.

    Google Scholar 

  16. M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31–60, April 2000.

    Google Scholar 

  17. Martin Hirt and Ueli Maurer. Robustness for free in unconditional multi-party computation. In CRYPTO’ 01, LNCS. Springer-Verlag, 2001.

    Google Scholar 

  18. Martin Hirt, Ueli Maurer, and Bartosz Przydatek. Efficient multi-party computation. In ASIA CRYPT 2000, LNCS. Springer-Verlag, December 2000.

    Google Scholar 

  19. M. V. N. Ashwin Kumar, K. Srinathan, and C. Pandu Rangan Asynchronous Perfectly Secure Computation tolerating Generalized Adversaries Technical Report, IITM, Chennai, February 2002.

    Google Scholar 

  20. M. Karchmer and A. Wigderson. On span programs. In Proceedings of the 8th Annual IEEE Structure in Complexity Theory, pages 102–111, 1993.

    Google Scholar 

  21. S. Micali and P. Rogaway. Secure computation. In CRYPTO’91, volume 576 of LNCS, pages 392–404. Springer-Verlag, 1991.

    Google Scholar 

  22. S. Micali and P. Rogaway. Secure Computation: The information theoretic case., 1998. Former version: Secure Computation, In CRYPTO’ 91, volume 576 of LNCS, pages 392–404, Springer-Verlag, 1991.

    Google Scholar 

  23. T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of 21st ACM STOC, pages 73–85, 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, M.V.N.A., Srinathan, K., Rangan, C.P. (2002). Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_37

Download citation

  • DOI: https://doi.org/10.1007/3-540-45450-0_37

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43861-8

  • Online ISBN: 978-3-540-45450-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics