22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sim(y A , s A ) = (y ′ A , r A):<br />

r A [a] = s a [A] (a ∈ A)<br />

r A [h] = y A (h ∈ H)<br />

y ′ A = y A<br />

Sim’(x ′ , w, y A , s A ) = (x, r A , y<br />

A ′ ):<br />

u h = (x ′ ∧ w[h]) ∨ t 1 (s A [h], u H ) (h ∈ H)<br />

x = t 2 (s A [h], u H ) (h = min H)<br />

y a ′ = x ′ ∧ w[a] (a ∈ A)<br />

r a [A] = s A [a] (a ∈ A)<br />

r a [H] = u H (a ∈ A)<br />

Figure 12: Simulators for the broadcast protocol when the dealer is honest (left) or dishonest (right)<br />

x ′ , w<br />

y ′ A<br />

y H<br />

s H<br />

r H<br />

Player[H]<br />

r A<br />

s A<br />

x ′ , w<br />

s A<br />

y A<br />

y H<br />

r A y<br />

A<br />

′<br />

y ′ H<br />

WCast<br />

Net<br />

Sim<br />

x<br />

BCast<br />

Figure 13: Security of broadcast protocol when the dealer is corrupted.<br />

must output (y ′ A , r A) such that (Sim| BCast) is equivalent to the system (Dealer| Player[H] |<br />

WCast| Net) specified by the last set of equations. The simulator is given in Figure 12 (left). It<br />

is immediate to verify that combining the equations of the simulator Sim with the equations y i = x<br />

of the ideal broadcast functionality, and eliminating local variables, yields a system of equations<br />

identical to (2).<br />

Dishonest dealer. We now consider the case where both the dealer and a subset of players<br />

A are corrupted. As before, let H = {1, . . . , n} \ A be the set of honest players. The system<br />

corresponding to a real execution of the protocol when Dealer and Player[A] are corrupted is<br />

(Player[H] | WCast| Net), mapping (x ′ , w, s A ) to (y H , r A , y<br />

A ′ ). (See Figure 13 (left).) Using<br />

the defining equations of Player[H], WCast and Net, and introducing auxiliary variables u h =<br />

y<br />

h ′ ∨ t 1(r h [1], . . . , r h [n]) for h ∈ H, we get the following set of equations:<br />

y h = t 2 (r h [A], r h [H]) = t 2 (s A [h], u H ) (h ∈ H)<br />

y a ′ = x ′ ∧ w[a] (a ∈ A)<br />

r a [A] = s A [a] (a ∈ A)<br />

r a [H] = u H<br />

u h = (x ′ ∧ w[h]) ∨ t 1 (s A [h], u H ) (h ∈ H)<br />

(3)<br />

This time the simulator Sim’ takes input (x ′ , w, y A , s A ) and outputs (x, r A , y<br />

A ′ ). (See Figure 13<br />

(right).) With these inputs and outputs, the simulator can directly set all variables except y h just<br />

as in the real system (3). The simulator can also compute the value y h , but it cannot set y h directly<br />

because this variable is defined by the ideal functionality as y h = x. We will prove that all variables<br />

y h defined by (3) take the same value. It follows that the simulator can set x = y h for any h ∈ H,<br />

18<br />

12. An Equational Approach to Secure Multi-party Computation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!