International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Taming Adaptivity in YOSO Protocols: The Modular Way

Authors:
Divya Ravi , Aarhus University
Ran Canetti , Boston University
Sebastian Kolby , Aarhus University
Eduardo Soria-Vazquez , Technology Innovation Institute
Sophia Yakoubov , Aarhus University
Download:
Search ePrint
Search Google
Presentation: Slides
Conference: TCC 2023
Abstract: YOSO-style MPC protocols (Gentry et al., Crypto’21), is a promising framework where the overall computation is partitioned into small, short-lived pieces, delegated to subsets of one-time stateless parties. Such protocols enable gaining from the security benefits provided by using a large community of participants where “mass corruption” of a large fraction of participants is considered unlikely, while keeping the computational and communication costs manageable. However, fully realizing and analyzing YOSO-style protocols has proven to be challenging: While different components have been defined and realized in various works, there is a dearth of protocols that have reasonable efficiency and enjoy full end to end security against adaptive adversaries. The YOSO model separates the protocol design, specifying the short-lived responsibilities, from the mechanisms assigning these responsibilities to machines participating in the computation. These protocol designs must then be translated to run directly on the machines, while preserving security guarantees. We provide a versatile and modular framework for analyzing the security of YOSO-style protocols, and show how to use it to compile any protocol design that is secure against static corruptions of t out of c parties, into protocols that withstand adaptive corruption of T out of N machines (where T/N is closely related to t/c, specifically when t/c < 0.5, we tolerate T/N ≤ 0.29) at overall communication cost that is comparable to that of the traditional protocol even when c << N. Furthermore, we demonstrate how to minimize the use of costly non-committing encryption, thereby keeping the computational and communication overhead manageable even in practical terms, while still providing end to end security analysis. Combined with existing approaches for transforming stateful protocols into stateless ones while preserving static security (e.g. Gentry et al. 21, Kolby et al. 22), we obtain end to end security.
BibTeX
@inproceedings{tcc-2023-33624,
  title={Taming Adaptivity in YOSO Protocols: The Modular Way},
  publisher={Springer-Verlag},
  author={Divya Ravi and Ran Canetti and Sebastian Kolby and Eduardo Soria-Vazquez and Sophia Yakoubov},
  year=2023
}