MPC vs. SFE: Unconditional and Computational Security
Martin Hirt, Ueli Maurer, and Vassilis Zikas
In secure computation among a set
This paper is concerned with characterizing for which adversary structures general secure function evaluation (SFE) and secure (reactive) multi-party computation (MPC) is possible, in various models. This has been achieved so far only for the very special model of perfect security, where, interestingly, the conditions for SFE and MPC are distinct. Such a separation was first observed by Ishai et al. in the context of computational security. We give the exact conditions for general SFE and MPC to be possible for information-theoretic security (with negligible error probability) and for computational security, assuming a broadcast channel, with and without setup. In all these settings we confirm the strict separation between SFE and MPC. As a simple consequence of our results we solve an open problem for computationally secure MPC in a threshold model with all three corruption types.
BibTeX Citation
@inproceedings{HiMaZi08, author = {Martin Hirt and Ueli Maurer and Vassilis Zikas}, title = {{MPC} vs. {SFE}: Unconditional and Computational Security}, editor = {Josef Pieprzyk}, booktitle = {Advances in Cryptology --- ASIACRYPT 2008}, pages = {1--18}, series = {Lecture Notes in Computer Science}, volume = {5350}, year = {2008}, month = {12}, publisher = {Springer-Verlag}, }