首页> 外文会议>Theory of Cryptography; Lecture Notes in Computer Science; 4392 >Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
【24h】

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

机译:对抗隐蔽对手的安全性:现实对手的高效协议

获取原文
获取原文并翻译 | 示例

摘要

In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that no coalition of corrupted parties should be able to learn more than specified or somehow cause the result to be "incorrect". Typically, corrupted parties are either assumed to be semi-honest (meaning that they follow the protocol specification) or malicious (meaning that they may deviate arbitrarily from the protocol). However, in many settings, the assumption regarding semi-honest behavior does not suffice and security in the presence of malicious adversaries is excessive and expensive to achieve. In this paper, we introduce the notion of covert adversaries, which we believe faithfully models the adversarial behavior in many commercial, political, and social settings. Covert adversaries have the property that they may deviate arbitrarily from the protocol specification in an attempt to cheat, but do not wish to be "caught" doing so. We provide a definition of security for covert adversaries and show that it is possible to obtain highly efficient protocols that are secure against such adversaries. We stress that in our definition, we quantify over all (possibly malicious) adversaries and do not assume that the adversary behaves in any particular way. Rather, we guarantee that if an adversary deviates from the protocol in a way that would enable it to "cheat", then the honest parties are guaranteed to detect this cheating with good probability. We argue that this level of security is sufficient in many settings.
机译:在安全多方计算的设置中,一组互不信任的方希望安全地计算其私有输入的某些联合功能。计算应以安全的方式进行,这意味着,任何腐败方的联盟都不能学习超过规定的内容,否则将导致结果“不正确”。通常,被损坏的各方被假定为半诚实(意味着他们遵循协议规范)或恶意的(意味着它们可以任意偏离协议)。但是,在许多情况下,关于半诚实行为的假设是不够的,并且在存在恶意对手的情况下,安全性过高且实现成本高昂。在本文中,我们介绍了隐蔽对手的概念,我们相信该模型会忠实地模拟许多商业,政治和社会环境中的对抗行为。秘密对手具有以下特性:他们可能会出于作弊目的而任意偏离协议规范,但不希望被“抓住”。我们提供了隐蔽对手的安全性定义,并表明可以获取针对此类对手安全的高效协议。我们强调,在我们的定义中,我们对所有(可能是恶意的)对手进行了量化,并且不假定对手以任何特定方式行事。相反,我们保证,如果对手偏离协议的方式使其可以“欺骗”,那么诚实方就可以保证很有可能检测到这种欺诈行为。我们认为,这种安全级别在许多情况下已足够。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号