On Complete Primitives for Fairness

  • Dov Gordon
  • Yuval Ishai
  • Tal Moran
  • Rafail Ostrovsky
  • Amit Sahai
Conference paper

DOI: 10.1007/978-3-642-11799-2_7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5978)
Cite this paper as:
Gordon D., Ishai Y., Moran T., Ostrovsky R., Sahai A. (2010) On Complete Primitives for Fairness. In: Micciancio D. (eds) Theory of Cryptography. TCC 2010. Lecture Notes in Computer Science, vol 5978. Springer, Berlin, Heidelberg

Abstract

For secure two-party and multi-party computation with abort, classification of which primitives are complete has been extensively studied in the literature. However, for fair secure computation, where (roughly speaking) either all parties learn the output or none do, the question of complete primitives has remained largely unstudied. In this work, we initiate a rigorous study of completeness for primitives that allow fair computation. We show the following results:

  • No “short” primitive is complete for fairness. In surprising contrast to other notions of security for secure two-party computation, we show that for fair secure computation, no primitive of size O(logk) is complete, where k is a security parameter. This is the case even if we can enforce parallelism in calls to the primitives (i.e., the adversary does not get output from any primitive in a parallel call until it sends input to all of them). This negative result holds regardless of any computational assumptions.

  • A fairness hierarchy. We clarify the fairness landscape further by exhibiting the existence of a “fairness hierarchy”. We show that for every “short” ℓ = O(logk), no protocol making (serial) access to any ℓ-bit primitive can be used to construct even a (ℓ + 1)-bit simultaneous broadcast.

  • Positive results. To complement the negative results, we exhibit a k-bit primitive that is complete for two-party fair secure computation. We show how to generalize this result to the multi-party setting.

  • Fairness combiners. We also introduce the question of constructing a protocol for fair secure computation from primitives that may be faulty. We show that this is possible when a majority of the instances are honest. On the flip side, we show that this result is tight: no functionality is complete for fairness if half (or more) of the instances can be malicious.

Download to read the full conference paper text

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

  • Dov Gordon
    • 1
  • Yuval Ishai
    • 2
    • 3
  • Tal Moran
    • 4
  • Rafail Ostrovsky
    • 3
  • Amit Sahai
    • 3
  1. 1.University of MarylandUSA
  2. 2.TechnionIsrael
  3. 3.University of CaliforniaLos Angeles
  4. 4.Harvard SEASUSA

Personalised recommendations