International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Reverse Firewalls for Adaptively Secure MPC without Setup

Authors:
Suvradip Chakraborty , IST Austria
Chaya Ganesh , IISc Bangalore
Mahak Pancholi , Aarhus University
Pratik Sarkar , Boston University
Download:
DOI: 10.1007/978-3-030-92075-3_12
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2021
Abstract: We study Multi-party computation (MPC) in the setting of subversion, where the adversary tampers with the machines of honest parties. Our goal is to construct actively secure MPC protocols where parties are corrupted adaptively by an adversary (as in the standard adaptive security setting), and in addition, honest parties' machines are compromised. The idea of reverse firewalls (RF) was introduced at EUROCRYPT'15 by Mironov and Stephens-Davidowitz as an approach to protecting protocols against corruption of honest parties' devices. Intuitively, an RF for a party $\mathcal{P}$ is an external entity that sits between $\mathcal{P}$ and the outside world and whose scope is to sanitize $\mathcal{P}$’s incoming and outgoing messages in the face of subversion of their computer. Mironov and Stephens-Davidowitz constructed a protocol for passively-secure two-party computation. At CRYPTO'20, Chakraborty, Dziembowski and Nielsen constructed a protocol for secure computation with firewalls that improved on this result, both by extending it to \textit{multi}-party computation protocol, and considering \textit{active} security in the presence of \textit{static} corruptions. In this paper, we initiate the study of RF for MPC in the \textit{adaptive} setting. We put forward a definition for adaptively secure MPC in the reverse firewall setting, explore relationships among the security notions, and then construct reverse firewalls for MPC in this stronger setting of adaptive security. We also resolve the open question of Chakraborty, Dziembowski and Nielsen by removing the need for a trusted setup in constructing RF for MPC. Towards this end, we construct reverse firewalls for adaptively secure augmented coin tossing and adaptively secure zero-knowledge protocols and obtain a constant round adaptively secure MPC protocol in the reverse firewall setting without setup. Along the way, we propose a new multi-party adaptively secure coin tossing protocol in the plain model, that is of independent interest.
Video from ASIACRYPT 2021
BibTeX
@inproceedings{asiacrypt-2021-31403,
  title={Reverse Firewalls for Adaptively Secure MPC without Setup},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-030-92075-3_12},
  author={Suvradip Chakraborty and Chaya Ganesh and Mahak Pancholi and Pratik Sarkar},
  year=2021
}