Complexity of Multi-Party Computation Functionalities

H. K. Maji, M. Prabhakaran, Mike Rosulek
{"title":"Complexity of Multi-Party Computation Functionalities","authors":"H. K. Maji, M. Prabhakaran, Mike Rosulek","doi":"10.3233/978-1-61499-169-4-249","DOIUrl":null,"url":null,"abstract":"The central objects of secure multiparty computation are the “multiparty functions” (or functionalities) that it seeks to securely realize. In this chapter we survey a set of results that constitute a Cryptographic Complexity Theory. This theory classifies and compares multiparty functions according to their secure computability and reducibility to each other. The basic questions studied, under various notions of security and reducibility, include: • Which functionalities are securely realizable (or are “trivial” – i.e., can be reduced to any functionality)? • Which functionalities are “complete” – i.e., those to which any functionality can be reduced? • More generally, which functionalities are reducible to which? Outside of triviality and completeness, this question is relatively less explored. Reductions yield relative measures of complexity among various functionalities. In the informationtheoretic setting, absolute complexity measures have also been considered. In particular, we discuss results regarding which functions have t-private protocols (in which security is required against a passive adversary corrupting t out of n players) and how this set changes as t increases from 1 to n. We treat separately the results on two-party functionalities, for which the cryptographic complexity is much better understood. In particular, we present unified combinatorial characterizations of completeness and triviality for secure function evaluation using notions of isomorphism and the common information functionality (called the kernel) of a given functionality. Beyond completeness and triviality, we also discuss results on general reducibility, and, in the computationally bounded setting, the connection between these reductions and computational hardness assumptions. We briefly discuss results on reactive functionalities, which are much less studied than non-reactive (secure function evaluation) functionalities. Finally, we conclude with a selection of open problems. ∗Department of Computer Science, University of California, Los Angeles. hmaji@cs.ucla.edu. †Department of Computer Science, University of Illinois, Urbana-Champaign, mmp@uiuc.edu. Supported by NSF grants CNS 07-47027 and CNS 12-28856. ‡Department of Computer Science, University of Montana. mikero@cs.umt.edu. Supported by NSF grant CCF-1149647","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Secure Multi-Party Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/978-1-61499-169-4-249","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

The central objects of secure multiparty computation are the “multiparty functions” (or functionalities) that it seeks to securely realize. In this chapter we survey a set of results that constitute a Cryptographic Complexity Theory. This theory classifies and compares multiparty functions according to their secure computability and reducibility to each other. The basic questions studied, under various notions of security and reducibility, include: • Which functionalities are securely realizable (or are “trivial” – i.e., can be reduced to any functionality)? • Which functionalities are “complete” – i.e., those to which any functionality can be reduced? • More generally, which functionalities are reducible to which? Outside of triviality and completeness, this question is relatively less explored. Reductions yield relative measures of complexity among various functionalities. In the informationtheoretic setting, absolute complexity measures have also been considered. In particular, we discuss results regarding which functions have t-private protocols (in which security is required against a passive adversary corrupting t out of n players) and how this set changes as t increases from 1 to n. We treat separately the results on two-party functionalities, for which the cryptographic complexity is much better understood. In particular, we present unified combinatorial characterizations of completeness and triviality for secure function evaluation using notions of isomorphism and the common information functionality (called the kernel) of a given functionality. Beyond completeness and triviality, we also discuss results on general reducibility, and, in the computationally bounded setting, the connection between these reductions and computational hardness assumptions. We briefly discuss results on reactive functionalities, which are much less studied than non-reactive (secure function evaluation) functionalities. Finally, we conclude with a selection of open problems. ∗Department of Computer Science, University of California, Los Angeles. hmaji@cs.ucla.edu. †Department of Computer Science, University of Illinois, Urbana-Champaign, mmp@uiuc.edu. Supported by NSF grants CNS 07-47027 and CNS 12-28856. ‡Department of Computer Science, University of Montana. mikero@cs.umt.edu. Supported by NSF grant CCF-1149647
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多方计算功能的复杂性
安全多方计算的中心对象是它寻求安全实现的“多方功能”(或功能)。在这一章中,我们概述了构成密码复杂性理论的一组结果。该理论根据多方函数的安全可计算性和彼此的可约性对其进行分类和比较。在各种安全性和可简化性的概念下,研究的基本问题包括:•哪些功能是可安全实现的(或者是“微不足道的”-即可以简化为任何功能)?•哪些功能是“完整的”——也就是说,任何功能都可以简化为哪些功能?•更一般地说,哪些功能可以简化为哪些?除了琐碎和完整性之外,这个问题相对较少被探索。减少产生了各种功能之间复杂性的相对度量。在信息理论的背景下,绝对复杂性度量也被考虑在内。特别是,我们讨论了关于哪些函数具有t-private协议的结果(其中需要安全性来防止被动对手从n个参与者中破坏t)以及当t从1增加到n时该集合如何变化。我们分别处理关于两方功能的结果,其中加密复杂性更好地理解。特别是,我们使用同构的概念和给定函数的公共信息功能(称为核),给出了安全函数评估的完整性和琐碎性的统一组合表征。除了完备性和琐碎性之外,我们还讨论了一般可约性的结果,以及在计算有界设置中,这些约约与计算硬度假设之间的联系。我们简要地讨论了响应性功能的结果,与非响应性(安全功能评估)功能相比,响应性功能的研究要少得多。最后,我们总结了一些开放问题。加州大学洛杉矶分校计算机科学系*。hmaji@cs.ucla.edu。†伊利诺伊大学厄巴纳-香槟分校计算机科学系,mmp@uiuc.edu。NSF资助项目CNS 07-47027和CNS 12-28856。蒙大拿大学计算机科学系mikero@cs.umt.edu。国家科学基金CCF-1149647资助
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Information-Theoretic Secure Multiparty Computation Complexity of Multi-Party Computation Functionalities A Short Tutorial of Zero-Knowledge General Cryptographic Protocols: The Very Basics Randomization Techniques for Secure Computation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1