22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

s ′ 0<br />

s ′ A<br />

r ′ A<br />

y ′ H<br />

s ′ 0<br />

s ′ A r ′ A<br />

y ′ H<br />

Net’<br />

s ′ H<br />

r ′ H<br />

Player[H]<br />

Sim’<br />

y ′ A<br />

x ′ , w<br />

WCast<br />

Figure 16: Security of the weak multicast protocol, when the dealer is dishonest.<br />

execution on the left. Simulated attack in the ideal world on the right.<br />

Real world<br />

unidirectional network functionality Net’: (F t [X] 2 ⊥ )n → (F t [X] 2 ⊥ )n that allows the VSS dealer to<br />

send to each party a pair of polynomials of degree at most t. See Figure 18 (right).<br />

The VSS protocol. We turn to the actual protocol securely implementing the VSS functionality.<br />

We first define some auxiliary functions. For any subset C ⊆ [n], let clique C : {⊥, ⊤} n×n → {⊥, ⊤}<br />

be the function clique C (G) = ∧ i,j∈C<br />

G[i, j]. This function is clearly monotone, and tests if C<br />

is a clique in G. For any set A, we equip the set A ⊥ with a monotone equality-test function<br />

eq : A ⊥ × A ⊥ → {⊥, ⊤} where eq(x, y) ≡ (x = y ≠ ⊥). Monotonicity follows from the fact that all<br />

the pairs (x, x) such that eq(x, y) = ⊤ are maximal elements in A ⊥ × A ⊥ .<br />

For any S ⊆ [n] of size |S| ≥ t + 1, and r ∈ F n b , let interpolate S(r) ∈ F t [X] ⊥ be the (unique)<br />

polynomial h ∈ F t [X] such that h(S) = r[S] if such polynomial exists, and interpolate S (r) = ⊥<br />

otherwise. For C ⊆ [n], define also a monotone function interpolate C,t : F n ⊥ → F t [Y ] ⊤ ⊥ where<br />

interpolate C,t (r) = ∨ {interpolate S (r): S ⊆ C, |S| = |C| − t}. Notice that interpolate C,t (r) = ⊥ if<br />

no interpolating polynomial exists, while interpolate C,t (r) = ⊤ if there are multiple solutions. Note<br />

that if n ≥ 4t + 1 and |C| ≥ n − t, then ⊤ never occurs: Indeed, let S, S ′ ⊆ C be such that<br />

|S| = |S| ′ = |C| − t, and such that both interpolate S (r) and interpolate S ′(r) differ from ⊥. Since<br />

|S ∩ S ′ | ≥ |C| − 2t ≥ n − 3t ≥ t + 1, we must have interpolate S (r) = interpolate S ′(r) by the fact<br />

that two degree t polynomials agreeing at t + 1 points are necessarily equal. For future reference,<br />

this is summarized by the following lemma.<br />

s ′ A<br />

r<br />

A<br />

′<br />

Net’<br />

s ′ 0<br />

s ′ H<br />

r<br />

H<br />

′<br />

x ′<br />

y<br />

H<br />

′<br />

Dealer<br />

Player[H]<br />

s ′ A r′ A<br />

Sim<br />

y ′ A<br />

x ′<br />

Int<br />

w<br />

WCast<br />

y ′ H<br />

Figure 17: Security of the weak multicast protocol, when the dealer is honest. Real world execution<br />

on the left. Simulated attack in the ideal world on the right.<br />

22<br />

12. An Equational Approach to Secure Multi-party Computation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!