22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

p<br />

r ′ A<br />

Net’<br />

s ′<br />

r ′ H<br />

r A sA<br />

G A<br />

Net Graph<br />

rH s H G H<br />

G H<br />

G A<br />

p H<br />

p<br />

s A<br />

r A<br />

r ′ A<br />

Sim<br />

p A<br />

G A<br />

G A<br />

p H<br />

Dealer<br />

Player[H]<br />

VSS<br />

Figure 20: Security of the VSS protocol when the dealer is honest.<br />

obtain the following equations describing (Dealer | Player[H] | Net’ | Net | Graph): For any<br />

i, j ∈ [n], and any h ∈ H, a ∈ A, we have<br />

f<br />

$<br />

←<br />

P t (p)<br />

r ′ i = (f(·, i), f(i, ·))<br />

r i [h] = f(i, h)<br />

r i [a] = s a [i]<br />

G[h, j] = eq(r h [j], f(h, j))<br />

G[a, j] = G a [j]<br />

∨<br />

o h =<br />

C⊆[n],|C|≥n−t<br />

p h = o h (0) .<br />

[<br />

cliqueC (G) ∧ interpolate C,t (r h ) ]<br />

For convenience, some simplifications have already been made: First g i and h i have been replaced<br />

by f(·, i) and f(i, ·), respectively. Second, we used the facts that r ′ i = s′ [i] and r i [h] = s h [i] = f(i, h)<br />

for all h ∈ H and all i ∈ [n] by the definitions of the network functionalities Net’ and Net. Finally,<br />

we have set values for G[·, ·] according to the protocol specification (for honest players) and the<br />

inputs G a of players a ∈ A.<br />

In order to further simplify the system, we claim that p h = p(h) for h ∈ H. If p = ⊥, then<br />

this is easy to see because f = ⊥ and G[h, j] = eq(r h [j], ⊥) = ⊥. Therefore, we necessarily have<br />

clique C (G) = ⊥ for all C ⊆ [n] with |C| ≥ n − t, since |C ∩ H| ≥ n − 2t > 0. So, we only need<br />

to prove the claim for p ≠ ⊥. Notice that the equations G[h, j] = eq(r h [j], f(h, j)), depending on<br />

whether j = h ′ ∈ H or j = a ∈ A, can be replaced by the set of equations<br />

G[h, h ′ ] = eq(r h [h ′ ], f(h, h ′ )) = eq(f(h, h ′ ), f(h, h ′ )) = ⊤<br />

G[h, a] = eq(r h [a], f(h, a)) = eq(s a [h], f(h, a)) .<br />

This in particular implies that C = H is a clique of size at least n − t in the graph defined by G,<br />

i.e., we have clique H (G) = ⊤ by the above. Also, since r h [h ′ ] = f(h, h ′ ), we necessarily have<br />

o h ≥ clique H (G) ∧ interpolate H,t (r h ) = ⊤ ∧ f(h, ·) = f(h, ·)<br />

by Lemma 1. Now, let S ⊆ C be any sets such that |C| ≥ n − t and |S| = |C| − t ≥ n − 2t. Since<br />

o h (h ′ ) = f(h, h ′ ) for all h ′ ∈ H and |S ∩ H| ≥ n − 3t ≥ t + 1, we have interpolate S (r h ) ≥ f(h, ·),<br />

and, by Lemma 1, interpolate S (r h ) = f(h, ·). This proves that o h = interpolate C,t (r h ) = f(h, ·), and<br />

p h = o h (0) = f(h, 0) = p(h).<br />

Summarizing, the real system is described by the following set of equations:<br />

24<br />

12. An Equational Approach to Secure Multi-party Computation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!