Theory of Cryptography Conference

TCC 2009: Theory of Cryptography pp 256-273

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation

  • Hemanta K. Maji
  • Manoj Prabhakaran
  • Mike Rosulek
Conference paper

DOI: 10.1007/978-3-642-00457-5_16

Volume 5444 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Maji H.K., Prabhakaran M., Rosulek M. (2009) Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation. In: Reingold O. (eds) Theory of Cryptography. TCC 2009. Lecture Notes in Computer Science, vol 5444. Springer, Berlin, Heidelberg

Abstract

In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both parties wish to securely compute f(x,y). We show several new results classifying the feasibility of securely implementing these functions in several security settings. Namely, we give new alternate characterizations of the functions that have (statistically) secure protocols against passive and active (standalone), computationally unbounded adversaries. We also show a strict, infinite hierarchy of complexity for SSFE functions with respect to universally composable security against unbounded adversaries. That is, there exists a sequence of functions f1, f2, ... such that there exists a UC-secure protocol for fi in the fj-hybrid world if and only if i ≤ j.

The main new technical tool that unifies our unrealizability results is a powerful protocol simulation theorem, which may be of independent interest. Essentially, in any adversarial setting (UC, standalone, or passive), f is securely realizable if and only if a very simple (deterministic) “canonical” protocol for f achieves the desired security. Thus, to show that f is unrealizable, one need simply demonstrate a single attack on a single simple protocol.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Hemanta K. Maji
    • 1
  • Manoj Prabhakaran
    • 1
  • Mike Rosulek
    • 1
  1. 1.Department of Computer ScienceUniversity of Illinois, Urbana-Champaign