• DocumentCode
    2386681
  • Title

    How to play almost any mental game over the net - concurrent composition via super-polynomial simulation

  • Author

    Barak, Boaz ; Sahai, Amit

  • Author_Institution
    Dept. of Comput. Sci., Princeton Univ., NJ, USA
  • fYear
    2005
  • fDate
    23-25 Oct. 2005
  • Firstpage
    543
  • Lastpage
    552
  • Abstract
    We construct a secure protocol for any multiparty functionality that remains secure (under a relaxed definition of security introduced by Prabhakaran and Sahai (STOC \´04)) when executed concurrently with multiple copies of itself and other protocols, without any assumptions on existence of trusted parties, common reference string, honest majority or synchronicity of the network. The relaxation of security is obtained by allowing the ideal-model simulator to run in quasipolynomial (as opposed to polynomial) time. Quasipolynomial simulation suffices to ensure security for most applications of multiparty computation. Furthermore, Lindell (FOCS \´03, TCC\´ 04) recently showed that such a protocol is impossible to obtain under the more standard definition of polynomial-time simulation by an ideal adversary. Our construction is the first such protocol under reasonably standard cryptographic assumptions (i.e., existence of a hash function collection that is collision resistent with respect to circuits of subexponential size, and existence of trapdoor permutations which are secure with respect to circuits of quasi-polynomial size). We introduce a new technique: "protocol condensing". That is, taking a protocol that has strong security properties but requires super-polynomial communication and computation, and then transforming it into a protocol with polynomial communication and computation, that still inherits the strong security properties of the original protocol. Our result is obtained by combining this technique with previous techniques of Canetti, Lindell, Ostrovsky, and Sahai (STOC \´02) and Pass (STOC \´04).
  • Keywords
    computational complexity; cryptography; protocols; ideal-model simulator; multiparty computation; multiparty functionality; polynomial-time simulation; protocol condensing; quasipolynomial simulation; quasipolynomial time; secure protocol; super-polynomial simulation; superpolynomial communication; superpolynomial computation; Circuits; Computational modeling; Computer science; Computer simulation; Cryptographic protocols; Cryptography; Nominations and elections; Polynomials; Security; Voting;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on
  • Print_ISBN
    0-7695-2468-0
  • Type

    conf

  • DOI
    10.1109/SFCS.2005.43
  • Filename
    1530746