首页    期刊浏览 2024年11月30日 星期六
登录注册

文章基本信息

  • 标题:A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
  • 本地全文:下载
  • 作者:Gilad Asharov, Yehuda Lindell
  • 期刊名称:Electronic Colloquium on Computational Complexity
  • 印刷版ISSN:1433-8092
  • 出版年度:2011
  • 卷号:2011
  • 出版社:Universität Trier, Lehrstuhl für Theoretische Computer-Forschung
  • 摘要:In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of information-theoretically secure computation was presented by Ben-Or, Goldwasser and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with \emph{perfect security}, in the private channels model. When the adversary is semi-honest this holds as long as tn2 parties are corrupted, and when the adversary is malicious this holds as long as tn3 parties are corrupted. Unfortunately, a full detailed proof of these results was never given. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. We also derive corollaries for security in the presence of adaptive adversaries and under concurrent general composition (equivalently, universal composability). In addition, we give a full specification of the protocol for the malicious setting. This includes one new step for the perfect multiplication protocol in the case of n4tn3 .
国家哲学社会科学文献中心版权所有