Partial fairness in secure two-party computation (Q421046): Difference between revisions
From MaRDI portal
Created a new Item |
Normalize DOI. |
||
(8 intermediate revisions by 7 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1007/s00145-010-9079-5 / rank | |||
Property / author | |||
Property / author: Jonathan N. Katz / rank | |||
Property / author | |||
Property / author: Jonathan N. Katz / rank | |||
Normal rank | |||
Property / review text | |||
This paper considers the goal of fairness in secure two-party computation. In this setting, fairness means that either both parties learn the output or neither does. The strongest formalization of this is known to be unattainable in general, so the authors here consider a relaxation to partial fairness. The notion of partial fairness they present maintains the real/ideal world paradigm of the full definition and merely relaxes the notion of simulation to allow a \(1/p\) chance of distinguishing the real and ideal worlds, where \(p\) is a polynomial. This work provides a broad understanding of how to achieve this definition for a wide class of functionalities (those with polynomial size domains or ranges) and also some impossibility results demonstrating the tightness of these feasibility results. More precisely, the authors consider randomized functionalities \(\mathcal{F} = \{ f_n : X_n \times Y_n \rightarrow Z_n\}\). Their first result establishes that as long as one of \(X_n, Y_n\) is of polynomial size, the functionality can be computed securely (with abort) and with partial fairness, assuming the existence of enhanced trapdoor permutations. Later, they establish the tightness of this result by demonstrating that there is a functionality where \(X_n, Y_n\) are of super-polynomial size, \(Z_n\) is of constant size, and no protocol for this functionality can simultaneously achieve security with abort and partial fairness even at the level of \(1/p = 1/5\). However, the authors prove that privacy can be achieved alongside partial fairness whenever \(Z_n\) has polynomial size, again assuming the existence of enhanced trapdoor permutations. This result is also shown to be tight in the sense that when the sizes of \(X_n, Y_n, Z_n\) are super-polynomial, there exist functionalities that cannot be computed with partial fairness even for the modest value of \(1/p = 1/3\). The main technique used to prove the feasibility results is to design protocols that proceed in (polynomially many) rounds, where the values learned by the parties in each round eventually shift from being randomly distributed to be the true values. The challenge then is to keep the party who learns the true value first from recognizing it immediately and hence halting participation before the other party has learned the true value. It is intuitive that polynomial size domains and ranges help with this, since if there are only polynomially many values, there is a significant chance that the real value can also occur in some of the randomly sampled rounds. The paper concludes by proposing some intriguing further questions. It is very natural to wonder if the tradeoff between the round complexity and the partial fairness parameter can be improved, and how these results could be extended to more than two parties. The authors also ask to what extent it may be possible to circumvent their negative examples by restricting to a more structured class of functionalities with large domains and ranges. | |||
Property / review text: This paper considers the goal of fairness in secure two-party computation. In this setting, fairness means that either both parties learn the output or neither does. The strongest formalization of this is known to be unattainable in general, so the authors here consider a relaxation to partial fairness. The notion of partial fairness they present maintains the real/ideal world paradigm of the full definition and merely relaxes the notion of simulation to allow a \(1/p\) chance of distinguishing the real and ideal worlds, where \(p\) is a polynomial. This work provides a broad understanding of how to achieve this definition for a wide class of functionalities (those with polynomial size domains or ranges) and also some impossibility results demonstrating the tightness of these feasibility results. More precisely, the authors consider randomized functionalities \(\mathcal{F} = \{ f_n : X_n \times Y_n \rightarrow Z_n\}\). Their first result establishes that as long as one of \(X_n, Y_n\) is of polynomial size, the functionality can be computed securely (with abort) and with partial fairness, assuming the existence of enhanced trapdoor permutations. Later, they establish the tightness of this result by demonstrating that there is a functionality where \(X_n, Y_n\) are of super-polynomial size, \(Z_n\) is of constant size, and no protocol for this functionality can simultaneously achieve security with abort and partial fairness even at the level of \(1/p = 1/5\). However, the authors prove that privacy can be achieved alongside partial fairness whenever \(Z_n\) has polynomial size, again assuming the existence of enhanced trapdoor permutations. This result is also shown to be tight in the sense that when the sizes of \(X_n, Y_n, Z_n\) are super-polynomial, there exist functionalities that cannot be computed with partial fairness even for the modest value of \(1/p = 1/3\). The main technique used to prove the feasibility results is to design protocols that proceed in (polynomially many) rounds, where the values learned by the parties in each round eventually shift from being randomly distributed to be the true values. The challenge then is to keep the party who learns the true value first from recognizing it immediately and hence halting participation before the other party has learned the true value. It is intuitive that polynomial size domains and ranges help with this, since if there are only polynomially many values, there is a significant chance that the real value can also occur in some of the randomly sampled rounds. The paper concludes by proposing some intriguing further questions. It is very natural to wonder if the tradeoff between the round complexity and the partial fairness parameter can be improved, and how these results could be extended to more than two parties. The authors also ask to what extent it may be possible to circumvent their negative examples by restricting to a more structured class of functionalities with large domains and ranges. / rank | |||
Normal rank | |||
Property / reviewed by | |||
Property / reviewed by: Allison Lewko / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A62 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6037990 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
fairness | |||
Property / zbMATH Keywords: fairness / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
secure two-party computation | |||
Property / zbMATH Keywords: secure two-party computation / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
randomized functionalities | |||
Property / zbMATH Keywords: randomized functionalities / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
privacy | |||
Property / zbMATH Keywords: privacy / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: Publication / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/s00145-010-9079-5 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1964545136 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4035733 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Protocols for Multiparty Coin Toss with Dishonest Majority / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536805 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536796 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Security and composition of multiparty cryptographic protocols / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3210165 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Practical and provably secure release of a secret and exchange of signatures / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Concurrent zero-knowledge / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Theory of Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Foundations of Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Session-key generation using human passwords only / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4279565 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Partial Fairness in Secure Two-Party Computation / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Complete Fairness in Multi-party Computation without an Honest Majority / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3549726 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3549592 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Completely fair SFE and coalition-safe cheap talk / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An Optimally Fair Coin Toss / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4434870 / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1007/S00145-010-9079-5 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 17:04, 9 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Partial fairness in secure two-party computation |
scientific article |
Statements
Partial fairness in secure two-party computation (English)
0 references
23 May 2012
0 references
This paper considers the goal of fairness in secure two-party computation. In this setting, fairness means that either both parties learn the output or neither does. The strongest formalization of this is known to be unattainable in general, so the authors here consider a relaxation to partial fairness. The notion of partial fairness they present maintains the real/ideal world paradigm of the full definition and merely relaxes the notion of simulation to allow a \(1/p\) chance of distinguishing the real and ideal worlds, where \(p\) is a polynomial. This work provides a broad understanding of how to achieve this definition for a wide class of functionalities (those with polynomial size domains or ranges) and also some impossibility results demonstrating the tightness of these feasibility results. More precisely, the authors consider randomized functionalities \(\mathcal{F} = \{ f_n : X_n \times Y_n \rightarrow Z_n\}\). Their first result establishes that as long as one of \(X_n, Y_n\) is of polynomial size, the functionality can be computed securely (with abort) and with partial fairness, assuming the existence of enhanced trapdoor permutations. Later, they establish the tightness of this result by demonstrating that there is a functionality where \(X_n, Y_n\) are of super-polynomial size, \(Z_n\) is of constant size, and no protocol for this functionality can simultaneously achieve security with abort and partial fairness even at the level of \(1/p = 1/5\). However, the authors prove that privacy can be achieved alongside partial fairness whenever \(Z_n\) has polynomial size, again assuming the existence of enhanced trapdoor permutations. This result is also shown to be tight in the sense that when the sizes of \(X_n, Y_n, Z_n\) are super-polynomial, there exist functionalities that cannot be computed with partial fairness even for the modest value of \(1/p = 1/3\). The main technique used to prove the feasibility results is to design protocols that proceed in (polynomially many) rounds, where the values learned by the parties in each round eventually shift from being randomly distributed to be the true values. The challenge then is to keep the party who learns the true value first from recognizing it immediately and hence halting participation before the other party has learned the true value. It is intuitive that polynomial size domains and ranges help with this, since if there are only polynomially many values, there is a significant chance that the real value can also occur in some of the randomly sampled rounds. The paper concludes by proposing some intriguing further questions. It is very natural to wonder if the tradeoff between the round complexity and the partial fairness parameter can be improved, and how these results could be extended to more than two parties. The authors also ask to what extent it may be possible to circumvent their negative examples by restricting to a more structured class of functionalities with large domains and ranges.
0 references
fairness
0 references
secure two-party computation
0 references
randomized functionalities
0 references
privacy
0 references