22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C.5 Secure Computation<br />

We make use of a two-party secure computation protocol (between parties D 1 and D 2 ). We make use of such a<br />

protocol that is secure in the standard ideal/real world paradigm.<br />

IDEAL WORLD. In the ideal world, there is a trusted party T that computes the desired functionality F on the<br />

inputs of the two parties. An execution of the ideal world consists of the following:<br />

Inputs: D 1 and D 2 have inputs x 1 and x 2 respectively and send their inputs to the trusted party T. Additionally,<br />

a corrupted party may change its input before sending them to T.<br />

Trusted party computes output: T computes F (x 1 , x 2 ).<br />

Adversary learns output: T returns F (x 1 , x 2 ) to A (here, either D 1 or D 2 is controlled by the adversary A).<br />

Honest parties learn output: A determines if the honest party should get the output and sends this to T. T<br />

sends F (x 1 , x 2 ) to this honest party (if the adversary says so) and ⊥ otherwise.<br />

Outputs: Honest parties output whatever T gives them. Corrupted parties, wlog, output ⊥. The view of A in<br />

the ideal world execution above includes the inputs of corrupt parties, the outputs of all parties, as well<br />

as the entire view of all corrupt parties in the system. A can output any arbitrary function of its view and<br />

we denote the random variable consisting of this output, along with the outputs of all honest parties, by<br />

IDEAL F,A (x 1 , x 2 ).<br />

REAL WORLD. In the real world, there is no trusted party and the parties interact directly with each other according<br />

to a protocol Π 2pc . Honest parties follow all instructions of Π 2pc , while adversarial parties are coordinated by<br />

a single adversary A and may behave arbitrarily. At the conclusion of the protocol, honest clients compute their<br />

output as prescribed by the protocol.<br />

For any set of adversarial parties (that is, corrupt D 1 or D 2 ) controlled by A and protocol Π 2pc for computing<br />

function F , we let REAL π,A (x 1 , x 2 ) be the random variable denoting the output of A in the real world execution<br />

above, along with the output of the honest parties. REAL π,A (x 1 , x 2 ) can be an arbitrary function of the view of<br />

A that consists of the inputs (and random tape) of corrupt parties, the outputs of all parties in the protocol, as<br />

well as the entire view of all corrupt parties in the system.<br />

SECURITY DEFINITION. Intuitively, we require that for every adversary in the real world, there exists an<br />

adversary in the ideal world, such that the views of these two adversaries are computationally indistinguishable.<br />

Formally,<br />

Definition 3 Let F and Π 2pc be as above. Protocol Π 2pc is a secure protocol for computing F if for every PPT<br />

adversary A that corrupts either D 1 or D 2 , in the real model, there exists a PPT adversary S 2pc (that corrupts<br />

the same party as A) in the ideal execution, such that:<br />

D<br />

Proof details<br />

D.1 Indistinguishability of the Views<br />

IDEAL F,A (x 1 , x 2 ) c ≡ REAL π,A (x 1 , x 2 )<br />

In prover to prove Theorem 1, we consider a series of hybrid experiments H 0 , . . . , H 4 , where H 0 represents the<br />

real world execution, while H 4 corresponds to the simulated execution in the ideal world. We will show that each<br />

consecutive pair of hybrid experiments are computationally indistinguishable. We can therefore conclude that<br />

H 0 and H 4 are computationally indistinguishable, as required.<br />

19<br />

11. How to Delegate Secure Multiparty Computation to the Cloud

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!