Secure two-party computation explained
Secure two-party computation (2PC) a.k.a. Secure function evaluation is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks.[1] The goal of 2PC is to create a generic protocol that allows two parties to jointly compute an arbitrary function on their inputs without sharing the value of their inputs with the opposing party.[2] One of the most well known examples of 2PC is Yao's Millionaires' problem, in which two parties, Alice and Bob, are millionaires who wish to determine who is wealthier without revealing their wealth. Formally, Alice has wealth
, Bob has wealth
, and they wish to compute
without revealing the values
or
.
Yao's garbled circuit protocol for two-party computation only provided security against passive adversaries.[3] One of the first general solutions for achieving security against active adversary was introduced by Goldreich, Micali and Wigderson[4] by applying Zero-Knowledge Proof to enforce semi-honest behavior.[5] This approach was known to be impractical for years due to high complexity overheads. However, significant improvements have been made toward applying this method in 2PC and Abascal, Faghihi Sereshgi, Hazay, Yuval Ishai and Venkitasubramaniam gave the first efficient protocol based on this approach.[6] Another type of 2PC protocols that are secure against active adversaries were proposed by Yehuda Lindell and Benny Pinkas,[7] Ishai, Manoj Prabhakaran and Amit Sahai[8] and Jesper Buus Nielsen and Claudio Orlandi.[9] Another solution for this problem, that explicitly works with committed input was proposed by Stanisław Jarecki and Vitaly Shmatikov.[10]
Secure multi-party computation
See main article: Secure multi-party computation.
Security
The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition.[11] The idealised scenario involves a trusted party that collects the input of the two parties mostly client and server over secure channels and returns the result if none of the parties chooses to abort. The cryptographic two-party computation protocol is secure, if it behaves no worse than this ideal protocol, but without the additional trust assumptions. This is usually modeled using a simulator. The task of the simulator is to act as a wrapper around the idealised protocol to make it appear like the cryptographic protocol. The simulation succeeds with respect to an information theoretic, respectively computationally bounded adversary if the output of the simulator is statistically close to, respectively computationally indistinguishable from the output of the cryptographic protocol. A two-party computation protocol is secure if for all adversaries there exists a successful simulator.
See also
Notes and References
- Web site: MPC Wallet - What is MPC? . 2022-10-19 . ZenGo . en-US.
- Book: Henecka . Wilko . K ögl . Stefan . Sadeghi . Ahmad-Reza . Schneider . Thomas . Wehrenberg . Immo . Proceedings of the 17th ACM conference on Computer and communications security . TASTY . 2010 . http://portal.acm.org/citation.cfm?doid=1866307.1866358 . en . Chicago, Illinois, US . ACM Press . 451–462 . 10.1145/1866307.1866358 . 978-1-4503-0245-6. 7276194 .
- Book: Yao . A. C. . 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982) . 1982 . 160–164 . Protocols for secure computations . 10.1109/SFCS.1982.38 . 206558698.
- Book: Goldreich. O.. Micali. S.. Wigderson. A.. Proceedings of the nineteenth annual ACM conference on Theory of computing - STOC '87 . How to play ANY mental game . 1987-01-01. https://doi.org/10.1145/28395.28420. New York, New York, US. Association for Computing Machinery. 218–229. 10.1145/28395.28420. 978-0-89791-221-1. 6669082 .
- Book: Goldwasser . S . Micali . S . Rackoff . C . Proceedings of the seventeenth annual ACM symposium on Theory of computing - STOC '85 . The knowledge complexity of interactive proof-systems . 1985-12-01 . https://doi.org/10.1145/22145.22178 . Providence, Rhode Island, US . Association for Computing Machinery . 291–304 . 10.1145/22145.22178 . 978-0-89791-151-1. 8689051 .
- Book: Abascal. Jackson. Faghihi Sereshgi. Mohammad Hossein. Hazay. Carmit. Ishai. Yuval. Venkitasubramaniam. Muthuramakrishnan. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security . Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC . 2020-10-30. https://doi.org/10.1145/3372297.3423366. CCS '20. Virtual Event, US. Association for Computing Machinery. 1591–1605. 10.1145/3372297.3423366. 978-1-4503-7089-9. 226228208 .
- Book: Lindell . Y. . Advances in Cryptology - EUROCRYPT 2007 . Pinkas . B. . An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries . 10.1007/978-3-540-72540-4_4 . 4515 . 52–78 . 2007 . Lecture Notes in Computer Science . 978-3-540-72539-8 .
- Book: Ishai . Y. . Advances in Cryptology – CRYPTO 2008 . Prabhakaran . M. . Sahai . A. . Founding Cryptography on Oblivious Transfer – Efficiently . 2008 . 978-3-540-85173-8 . Lecture Notes in Computer Science . 5157 . 572–591 . 10.1007/978-3-540-85174-5_32.
- Book: Nielsen . J. B. . Orlandi . C. . 10.1007/978-3-642-00457-5_22 . LEGO for Two-Party Secure Computation . Theory of Cryptography . Lecture Notes in Computer Science . 5444 . 368–386 . 2009 . 978-3-642-00456-8 . 10.1.1.215.4422 .
- Book: Jarecki . S. . Advances in Cryptology - EUROCRYPT 2007 . Shmatikov . V. . Efficient Two-Party Secure Computation on Committed Inputs . 10.1007/978-3-540-72540-4_6 . 4515 . 97–114 . 2007 . Lecture Notes in Computer Science . 978-3-540-72539-8 .
- Lindell . Yehuda . Pinkas . Benny . An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries . Journal of Cryptology . 2015 . en . 28 . 2 . 312–350 . 10.1007/s00145-014-9177-x . 253638839 . 0933-2790. free .