Theory of Cryptography
DOI: 10.1007/978-3-540-78524-8_14
|View full text |Cite
|
Sign up to set email alerts
|

MPC vs. SFE: Perfect Security in a Unified Corruption Model

Abstract: Abstract. Secure function evaluation (SFE) allows a set of players to compute an arbitrary agreed function of their private inputs, even if an adversary may corrupt some of the players. Secure multi-party computation (MPC) is a generalization allowing to perform an arbitrary on-going (also called reactive or stateful) computation during which players can receive outputs and provide new inputs at intermediate stages.At Crypto 2006, Ishai et al. considered mixed threshold adversaries that either passively corrup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
6
0

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 24 publications
1
6
0
Order By: Relevance
“…This is the most natural way of defining PCBA in the mixed active/passive model and it is consistent with the past literature on secure distributed computation tolerating a mixed adversary, e.g. [14,22,24,5,23], as well as the literature tolerating passive corruption only (semihonest model), e.g., [30,19,7].…”
Section: Definition and Reductionssupporting
confidence: 54%
See 3 more Smart Citations
“…This is the most natural way of defining PCBA in the mixed active/passive model and it is consistent with the past literature on secure distributed computation tolerating a mixed adversary, e.g. [14,22,24,5,23], as well as the literature tolerating passive corruption only (semihonest model), e.g., [30,19,7].…”
Section: Definition and Reductionssupporting
confidence: 54%
“…The high-level idea is the following: first, in a distribution phase, the sender p sends his input and his signature on it to every player; in a second phase, all the players run a protocol to establish a consistent view on the sender's value. Although this sounds similar to the standard approach for constructing a Broadcast protocol [8,1] (i.e., first have p multi-send his input and then invoke Consensus), our second phase cannot be realized by a Consensus protocol as the condition C (5) PCBA (P, Z, {p}) is weaker than C c/s PCBA (P, Z, P) which is necessary for Consensus. Nevertheless, to realize the second phase we use an approach which is inspired by the methodology of [8] for achieving Consensus.…”
Section: Pcba({p}) (Broadcast With Sender P)mentioning
confidence: 91%
See 2 more Smart Citations
“…In this paper, we will only consider threshold adversaries. More general adversarial models have also been studied, both in terms of a more general specification of the parties the adversary can corrupt by Hirt and Maurer [10] and considering a mix active and passive adversarial corruptions by Beerliová-Trubíniová et al [2].…”
Section: Introductionmentioning
confidence: 99%