Abstract
This paper describes a method for n players, a majority of which may be faulty, to compute correctly, privately, and fairly any computable function f(x1, . . . , xn,) where xi is the input of the i-th player. The method uses as a building block an oblivious transfer primitive.
Previous methods achieved these properties, only for boolean functions, which, in particular, precluded composition of such protocols.
We also propose a simpler definition of security for multi-player protocols which still implies previous definitions of privacy and correctness.
Supported by ARO grant DAAL 03-86-K-0171 and NSF PYI grant 8657527-CCR with IBM matching funds
Supported by an NSF grant, and the MIT laboratory of computer science.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority, proceedings of Crypto89, Santa Barbara, CA, August 1989.
D. Beaver, S. Goldwasser. Multi Party Fault Tolerant Computation with Faulty Majority Based on Oblivious Transfer, proceedings of FOCS89, Duke, NC, October 1989, pp. 468–473.
M. Ben-Or, S. Goldwasser, A. Wigderson. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. Proc. of 20th STOC 1988, pp. 1–10.
Ben-Or, Michael, Oded Goldreich, Shafi Goldwasser, Johan Hastad, Joe Kilian, Silvio Micali, Phillip Rogaway, “IP is in Zero-Knowledge,” Proceedings, Advances in Cryptology, Crypto 1988.
Rabin, T. and M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proc. of 2lst STOC, ACM, 1989.
Blakely, T.. Security Proofs for Information Protection Systems. Proceedings of the 1980 Symposium on Security and Privacy, IEEE Computer Society Press, NY, pp. 79–88, 1981.
Brassard, Gilles, Claude Crépeau, and David Chaum, “Minimum Disclosure Proofs of Knowledge,” manuscript.
Brassard, Gilles, Claude Crépeau, and Jean-Marc Robert. “Information Theoritic Reductions Among Disclosure Problems,” Proceedings of the 27th FOCS, IEEE, 1986, 168–173.
E. Brickell, D. Chaum, I. Damgaard, J. van de Graaf. Gradual and Verifiable Release of A Secret. CRYPTO 1987.
D. Chaum, C. Crepeau, I. Damgaard. Multiparty Unconditionally Secure Protocols. Proc. of 20th STOC 1988, pp. 11–19.
Chaum, David, Ivan Damgard, and Jeroen van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output,” Proceedings of CRYPTO’ 85, Springer-Verlag, 1986, 477–488.
R. Cleve. Limits on the Security of Coin Flips When Half the Processors are Faulty. STOC 1986.
Cohen, Fischer. A Robust and Verifiable Cryptographically Secure Election. FOCS 1985.
C. Crepeau and J. Kilian. Achieving Oblivious Transfer Using Weakened Security Assumptions. FOCS 1988.
Crépeau Claude, “On the Equivalence of Two Types of Oblivious Transfer”, Crypto87.
B. Chor, S. Goldwasser, S. Micali, B. Awerbuch. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. FOCS 1985.
B. Chor, M. Rabin. Achieving Independence in Logarithmic Number of Rounds. PODC 1986.
Even S., Goldreich O., and A. Lempel, A Randomized Protocol for Signing Contracts, CACM, vol. 28, no. 6, 1985, pp. 637–647.
Fischer M., Micali S., and Rackoff C. Oblivious Transfer Based in Quadratic Residuosity, Unpublished.
Z. Gali1, S. Haber, M. Yung. Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public Key Model. Proc. CRYPTO 1987.
O. Goldreich, S. Micali, A. Wigderson. How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority. Proc. of 19th STOC 1987, pp. 218–229.
Goldreich, O., Vainish, R. “How to Solve any Protocol Problem: An Efficiency Improvement”, Crypto 87.
Goldwasser, Micali, Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. of Comp 1989.
S. Haber. Multi-Party Cryptographic Computation: Techniques and Applications. Ph.D. Thesis, Columbia University, 1988.
Impagliazzo, Russell and Moti Yung, “Direct Minimum Knowledge Computations,” Proceedings, Advances in Cryptology, Crypto 1987.
Kilian, Joe, “On The Power of Oblivious Transfer,” Proceedings of the 20th STOC, ACM, 1988, pp. 20–29. Also appeared in Uses of Randomness In Algorithms and Protocols, An ACM Distinguished Dissertation 1989.
J. Kilian. S. Micali. P. Rogaway Security Definitions for Multi Party Protocols. In Preparation.
Micali Luby Rackoff 83. The Miraculous Exchange of a Secret bit, Proc. of FOCS 1983.
A. Shamir. How to Share a Secret. CACM 22, 612–613, 1979.
Yao, Andrew C. “Protocols for Secure Computations,” Proceedings of the 23rd FOCS, IEEE, 1982, 160–164.
Yao, Andrew C. “How to Generate and Exchange Secrets,” Proceedings of the 27th FOCS, IEEE, 1986, 162–167.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goldwasser, S., Levin, L. (1991). Fair Computation of General Functions in Presence of Immoral Majority. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_6
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive