Realistic Failures in Secure Multi-party Computation
Vassilis Zikas , Sarah Hauser , and Ueli Maurer
In secure multi-party computation, the different ways in which the adversary can control the corrupted players are described by different corruption types. The three most common corruption types are active corruption (the adversary has full control over the corrupted player), passive corruption (the adversary sees what the corrupted player sees) and fail-corruption (the adversary can force the corrupted player to crash irrevocably). Because fail-corruption is inadequate for modeling recoverable failures, the so-called omission corruption was proposed and studied mainly in the context of Byzantine Agreement (BA). It allows the adversary to selectively block messages sent from and to the corrupted player, but without actually seeing the message.
In this paper we propose a modular study of omission failures in MPC, by introducing the notions of send-omission (the adversary can selectively block outgoing messages) and receive-omission (the adversary can selectively block incoming messages) corruption. We provide security definitions for protocols tolerating a threshold adversary who can actively, receive-omission, and send-omission corrupt up to
BibTeX Citation
@inproceedings{ZiHaMa09, author = {Vassilis Zikas and Sarah Hauser and Ueli Maurer}, title = {Realistic Failures in Secure Multi-party Computation}, editor = {Omer Reingold}, booktitle = {Theory of Cryptography Conference --- TCC 2009}, pages = {274-293}, series = {Lecture Notes in Computer Science}, volume = {5444}, year = {2009}, month = {3}, publisher = {Springer-Verlag}, }