Minimizing setup in secure computation
Abstract
Secure Multi-party Computation (MPC) considers the problem where a set
of mutually distrusting parties want to jointly compute a function over their
private inputs, without revealing any extra information about these inputs other
than what it can be inferred from the output of the function. This setting is
well-motivated, and it has many real-world applications such as auction, voting,
etc. MPC can be also seen as a generalization of many natural cryptographic
primitives. For example, zero-knowledge (ZK) can be viewed as a special case
of two-party secure computation. In ZK, a party, called prover aims to convince
a second party, called verifier, that the prover’s private input witness w and a
public input statement x belong to a relation R.
An important research direction in secure computation is to find the trade-off
between the required setup (e.g., the use of the broadcast channel, the use
of common reference string (CRS) / public key infrastructure (PKI), the upper
bound of the parties that can be corrupted, etc.), and the security guarantees that
can be achieved. The setups can be viewed as some general assumptions that the
protocol needs to satisfy, and they influence the usability of the protocol in real-world
scenarios. In principle, having simpler (or no) setups mean that the protocol
is more general and can be more useful in real-world scenarios. At the same time,
having simpler setups may lead to weaker security guarantees. Therefore, finding
the trade-off between setup and security guarantees is important and meaningful.
In this thesis, we target MPC and ZK, and we focus on how to minimize the
setup for MPC and ZK while still providing meaningful levels of security. More
specifically:
Regarding MPC, we focus on the dishonest majority (i.e., the adversary can
corrupt all but one party), and we aim at 1) minimizing the use of broadcast
channels. 2) studying the MPC with pre-processing when no setup is available.
• Informally, a broadcast channel guarantees that when a message is sent,
this reaches all the parties, without ambiguity. It also guarantees that
if an honest party receives a message from a corrupted party, then it is
guaranteed that all the honest parties have received the message. To realize
broadcast, parties in the protocol could run the broadcast protocol, which
may require many rounds of peer-to-peer communications. An alternative
way is to rely on physical or external infrastructure such as blockchain. In
both cases, broadcast is expensive, as such, we want to minimize its use.
In particular, this thesis presents the following results:
– When assuming no setup, we give a complete characterization with
respect to the use of broadcast channels, and we obtain the optimal
results.
– We consider the same problem for the case that we only want to allow
the black-box use (i.e., do not have access to the code of the algorithm)
of the oblivious transfer protocol. We also give a characterization.
• In the standard definition of MPC, the parties’ private inputs are fixed
before the start of the protocol. However, there is another type of MPC
named MPC with pre-processing, where the protocol can pre-compute some
messages without using parties’ inputs, and these messages can accelerate
computations in the online phase (i.e., other computations that require
parties’ inputs). Since some expensive computations can be pre-computed,
the online phase could be more lightweight. Therefore, we want to remove
the dependency of the input from as many rounds as possible, so that we
can do some pre-processing. In this direction, we explore the protocol with
no setup. We provide a compiler that can turn a big class of MPC protocol
that may require the inputs already to compute the first round, into a new
protocol that needs the inputs only in the last two rounds. We also propose
new MPC definitions that capture this delayed-input features.
Regarding ZK, we do the following:
• In standard single-theorem ZK definition, the security of the ZK protocol
is guaranteed to hold only when one proof is issued. In the case where multiple
zero-knowledge proofs need to be issued (i.e., to prove multiple NP
statements), each new zero-knowledge proof requires a freshly generated
setup. In the multi-theorem ZK definition, instead, one setup is sufficient
for generating multiple zero-knowledge proofs for multiple instances. We
propose a multi-theorem protocol (in the format of a compiler) that follows
the Fiat-Shamir paradigm and relies on correlation intractable hash
functions. Moreover, our protocol remains zero-knowledge and sound even
against adversaries that choose the statement to be proven (and the witness
for the case of zero-knowledge) adaptively on the key of the hash function. Prior works could achieve this adaptive security only inefficiently via NP reductions.
• ZK protocols are secure only when all setups are correctly generated, but
in real-world scenarios, some of the setups may not be correctly generated.
For instance, to run a non-interactive zero-knowledge (NIZK) protocol, the
setup CRS could be chosen with bias. In this case, the security of the NIZK
protocol does not hold anymore. Instead of finding a secure ZK candidate,
one alternative solution is to have multiple instantiations of ZK candidates
and assume that only for a subset of them the setup is generated correctly.
More formally, we consider the case where only a subset of the instances
are secure. In more detail, given access to n candidate instantiations of a
NIZK for some language, we want to have a construction that itself implements
a NIZK for the same language without relying on any additional
computational assumptions. We refer to this type of construction as combiner,
and the combiner is secure assuming at least t of the given candidates
are secure. In this work, we provide three different constructions of robust
NIZK combiners and show that combiners are impossible to realize unless
the majority of the input candidates are secure.
This item appears in the following Collection(s)

