22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

x<br />

sA<br />

r A<br />

y ′ A<br />

Dealer<br />

y ′ A<br />

y H<br />

s H<br />

r H<br />

Player[H]<br />

s A<br />

r A<br />

x<br />

Sim<br />

y H<br />

x ′ , w<br />

y ′ H<br />

y A<br />

WCast<br />

Net<br />

BCast<br />

Figure 11: Security of broadcast protocol when the dealer is honest<br />

provided by the honset players, t 1 is always bigger than t 2 regardless of the other values). It is<br />

easy to see that the threshold functions t i (u) = ∨ |S|=k i<br />

∧j∈S u j satisfy these properties provided<br />

|A| < k 1 ≤ k 2 − |A| ≤ n − 2|A|, which in paricular requires n ≥ |A| + 1.<br />

In the security analysis, we distinguish two cases, depending on whether the dealer is corrupt<br />

or not.<br />

Honest dealer. First we consider the simple case where the adversary corrupts a set of players<br />

A ⊂ {1, . . . , n}, and the dealer behaves honestly. Let H = {1, . . . , n}\A be the set of honest players.<br />

An execution of the protocol when players in A are corrupted is described by the system (Dealer |<br />

Player[H] | WCast | Net) with input (x, s A ) and output (y H , y<br />

A ′ , r A) depicted in Figure 11 (left).<br />

Note that in this (and the following) figures, double arrows and boxes denote parallel processes and<br />

channels. Combining the defining equations of Dealer, Player[h] for h ∈ H, WCast and Net,<br />

and introducing the auxiliary variables u h = x ∨ t 1 (s A [h], s H [h]) for all h ∈ H, we get that for any<br />

i, j ∈ [n], and h ∈ H the following holds:<br />

r j [i] = s i [j]<br />

y ′ i = x ′ ∧ w[i] = x ∧ ⊤ = x<br />

s h [i] = y h ′ ∨ t 1(r h [1], . . . , r h [n]) = x ∨ t 1 (s A [h], s H [h]) = u h<br />

y h = t 2 (r h [1], . . . , r h [n]) = t 2 (s A [h], s H [h]) = t 2 (s A [h], u H )<br />

u h = x ∨ t 1 (s A [h], s H [h]) = x ∨ t 1 (s A (h), u H ) .<br />

The last equation u h = x ∨ t 1 (s A (h), u H ) provides a recursive definition of u H , which can be<br />

easily solved by an iterative least fix point computation: starting from u (0)<br />

H = ⊥H , we get u (1)<br />

H =<br />

(x ∨ t 1 (s A (h), u (0)<br />

H ))H = x H , and then again u (2)<br />

H = (x ∨ t 1(s A (h), u (1)<br />

H ))H = x H . Therefore the least<br />

fix point is u H = x H . Substituting u H = x H in the previous equations, and using the properties<br />

of t 2 , we see that the system of equations defined by (Dealer | Player[H] | WCast | Net) is<br />

equivalent to<br />

r a = (s A [a], x H ) (a ∈ A)<br />

y a ′ = x (a ∈ A)<br />

(2)<br />

y h = t 2 (s A [h], x H ) = x (h ∈ H)<br />

We now show that an equivalent system can be obtained by combining the ideal functionality<br />

BCast with a simulator Sim as in Figure 11 (right). The simulator takes (y A , s A ) as input, and<br />

17<br />

12. An Equational Approach to Secure Multi-party Computation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!