Presentation is loading. Please wait.

Presentation is loading. Please wait.

Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University.

Similar presentations


Presentation on theme: "Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University."— Presentation transcript:

1 Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University of Maryland)

2 Verifiable secret sharing (VSS)  Two-phase protocol A dealer shares a secret among a set of n parties in the sharing phase The secret is recovered in a reconstruction phase  If the dealer is honest No information about the secret is leaked in the sharing phase All honest parties recover the dealer’s secret  Even if the dealer is dishonest The view of the honest parties in the sharing phase defines a value s such that each honest party outputs s in the reconstruction phase

3 Feasibility and efficiency?  We study perfect (i.e., 0-error) VSS  This is known to be possible iff t < n/3 (even if broadcast is available)  What is the inherent round complexity of this task? 3 rounds necessary (even w/ b’cast) [GIKR01] O(1)-round protocol only possible if there is at least 1 round of broadcast

4 Upper bounds?  Gennaro et al. show an efficient 4-round protocol and an inefficient 3-round protocol  Fitzi et al. give an efficient 3-round protocol Using broadcast in two of the rounds  What happens if their protocol is implemented in a point-to-point network…? Simulating broadcast is expensive… Sequential composition of broadcast is expensive… The protocol requires 55 rounds (in expectation)!

5 The upshot  If the goal is to optimize round complexity for point-to-point networks, crucial to minimize the number of broadcast rounds  Does there exist a VSS protocol that is simultaneously optimal in the number of rounds and the number of broadcasts? Recall: 1 round of broadcast is (essentially) necessary

6 Our results  We give a positive answer to this question A 3-round protocol using a single round of broadcast Secure against an adaptive, rushing adversary  Our VSS protocol also satisfies a useful property (2-level sharing) not satisfied by the protocol of Fitzi et al.

7 The rest of the talk  WSS A weaker variant of VSS A 3-round WSS protocol using 1 round of broadcast  VSS A 3-round VSS protocol using the WSS protocol as a building block

8 WSS: definition  WSS is similar to VSS  Weaker guarantee for dishonest dealer: The view of the honest parties in the sharing phase defines a value s such that each honest party outputs either s or  in the reconstruction phase

9 WSS protocol: sharing phase  Round 1 D chooses F(x,y) with F(0,0) = s D sends to P i, f i (x) := F(x,i), g i (y) := F(i,y) Each P i sends a random pad r i,j to both P j and D  Round 2 For every ordered pair (i, j)  P i sends a i,j := f i (j) to P j  P j sends b j,i := g j (i) to P i P j sends r’ i,j = r i,j to D

10 Sharing phase, continued  Round 3 (broadcast round)  For every ordered pair (i, j): P i broadcasts  (“disagree”, f i (j), r i,j ) if b j,i ≠ f i (j)  (“agree”, f i (j)+r i,j ) otherwise P j broadcasts  (“disagree”, g j (i), r i,j ) if a i,j ≠ g j (i)  (“agree”, g j (i)+r i,j ), otherwise D broadcasts  (“not equal”, F(j,i)) if r i,j ≠ r’ i,j  (“equal”, F(j,i)+r i,j ) otherwise

11 Local computation  Ordered pair (P i,P j ) are conflicting if: P i broadcasts (“disagree”, f i (j), r i,j ) P j broadcasts (“disagree”, g j (i), r’ i,j ) and r i,j = r' i,j  Note: If D is honest, then no two honest parties will be conflicting  Note: all honest parties agree on who is conflicting

12 Local computation  In conflicting pair (P i, P j ), we say P i is unhappy if either: D broadcasts (“not equal”, d i,j ) and d i,j ≠ f i (j) D broadcasts (“equal”, d i,j ) and d i,j ≠ f i (j)+r i,j  If there are more than t unhappy parties, then D is disqualified  Note: honest dealer never disqualified  Note: all honest parties agree on who is unhappy

13 WSS protocol: reconstruction phase  If P j not unhappy, it sends f j (x) and g j (y) to all parties Let f i j and g i j denote the polynomials P i sends to P j  P i constructs a consistency graph G i Edge between P j and P k in G i iff f j i (k)=g k i (j) and g j i (k)=f k i (j) Iteratively remove vertices in G i with degree < n−t  Let Core i be the parties left in G j If |Core i |< n-t, then P i outputs  Else, let F’(x,y) be the polynomial defined by any t+1 parties in Core i, and output s':=F'(0,0)

14 Proof sketches  Privacy t points on a degree-t polynomial do not reveal information about the constant term No information about s leaked in round 3 due to use of random pads  Correctness for honest D: If P i honest, then: All honest parties are in Core i, so |Core i | ≥ n-t Any party in Core i must have sent polynomials that agree with at least 2t+1 parties in Core i, out of which at least t+1 are honest Since the polynomials sent by honest parties all agree with the dealer’s polynomial F, we see that P i will correctly recover F and output the dealer’s secret

15 Proof sketches, continued  Weak commitment (for dishonest D): Assume dealer is not disqualified (so at most t unhappy parties, and at least n-2t ≥ t+1 honest parties who are not unhappy) Claim: the poly’s f i sent by D to the first t+1 such parties define a poly F such that any honest P i outputs either F(0,0) or  in reconstruction phase If |Core i | < n-t, we are done Otherwise, argument is similar to (though slightly more involved than) before  This completes the proof

16 VSS  We now construct a 3-round VSS protocol (using 1 round of broadcast) using the previous WSS protocol as a subroutine  Our VSS protocol also achieves “2-level sharing”…

17 2-level sharing  At the end of the sharing phase each honest P i outputs s i and {s i,j } such that The {s i } lie on a degree-t polynomial whose constant term is the value s that honest parties will output in the reconstruction phase For each j, the {s i,j } lie on a degree-t polynomial whose constant term is s j  Useful when VSS is used as a building block for general secure MPC

18 Overview of the protocol  Sharing done essentially as in WSS, but now parties reveal their random pads in the reconstruction phase  To ensure correctness, we use WSS to generate the random pads Random pads no longer independent, but lie on a random degree-t poly (which suffices for secrecy)  To obtain 2-level sharing, we have the dealer choose a symmetric bivariate polynomial

19 VSS protocol: high level  Round 1 D chooses symmetric F(x,y) with F(0,0) = s D sends to P i, f i (x):=F(x,i) Each P i chooses a random s i and shares it using WSS; let F i pad be the polynomial used P i sends F i pad (x,j) to each P j and F i pad (0,y) to D  Round 2 Set r i,j = F i pad (i,j); rest is as before Run second round of all WSS sub-protocols

20 VSS protocol: high level  Round 3 As before Also run third round of all WSS sub-protocols

21 Local computation  We define a conflicting pair and an unhappy party as before  Core is the set of all happy parties  Core i is the set of all happy parties in WSS i  All players agree on Core and {Core i }

22 Local computation, continued  For all i, j remove P j from Core i if, in round 3: P i broadcasts (“agree”, y) and P j did not broadcast (“agree”, y) OR P i broadcasts (“disagree”,*,w) and P j broadcasts anything other than (“disagree”,*,w)  Remove P i from Core if |Core ∩ Core i |< n−t  If |Core| < n−t, then D is disqualified  Each party P i computes f i (x) as follows: If P i  Core, then f i (x) is the polynomial received from D in round 1 See paper for the other case  Each P i outputs s i = f i (0) and s i,j = f i (j)

23 VSS: reconstruction phase  Each party P i sends s i to all other parties Let s' j,i be the value that P j sends to P i  P i computes a degree-t poly f(x) such that f(j)=s’ j,i for at least 2t+1 values of j  P i outputs f(0)

24 Proof sketches  Privacy Same as WSS except for random pads Random pads lie on random degree-t polynomials and hence reveal no additional information about s  Correctness with 2-level sharing (D honest): For honest P i, all other honest parties belong to Core i All honest parties remain in Core p(x)=F(0,x) and p j (x)=F(j,x) imply 2-level sharing The reconstruction phase succeeds since there are at most t bad shares out of n>3t shares

25 Proof sketches, continued  Correctness with 2-level sharing (dealer dishonest): Refer to the full version of the paper for a proof http://eprint.iacr.org/2007/358

26 Open questions  What is the optimal (expected) round complexity of VSS in a point-to-point network?  Can better round complexity be achieved for statistical VSS?  How about (statistical) VSS for t < n/2? See Patra et al. for some recent progress on these questions

27 Thank you!

28 Local computation, continued  If P i not in Core,  Core' i : P j is in Core' i if and only if P j ∈ Core and P i ∈ Core j {p j,k } k are consistent with a polynomial B j (x) of degree at most t, where  p j,k :=y j,k - if in step 1 of round 3 for the ordered pair (j, k), party P j broadcasted (“agree”, y j,k ) ‏  p j,k :=w j,k +z j,k - If P j broadcasted (“disagree”,w j,k,z j,k ) ‏  For each P j ∈ Core' i, p j :=p j,i −f j,i pad (0). Let f i be the interpolating polynomial for p j with P j ∈ Core' i  Finally, P i outputs s i :=f i (0) and s i,j :=f i (j) ‏

29 Proof sketches, continued  Correctness with 2-level sharing (D dishonest): For honest P i, |Core’ i |>t Core contains atleast t+1 honest parties. For an honest P j, Core j contains P i. p j,k computed by P i lie on B j (x)=f j (x)+F j pad (0,x), since P j ∈ Core, and D do not disagree on broadcasted values. There are t+1 honest parties in Core F(x,y) is defined naturally by these parties. Polynomials of honest P i ∈ Core agree with F(x,y).

30 Proof sketches, continued  Constructed polynomials of Honest P i not in Core agree with F(x,y). For any P k ∈ Core j, we have f j,k pad (x)=F j pad (0,k) and f k (j)=F(k,j) (otherwise removed from Core i ). B j (k) is recovered for atleast t+1 values of k. B j (x)=F(x,j)+F j pad (0,x) is recovered. p j =p j,i -f j,i pad (0)=B j (i)–F j pad (0,i)=F(i,j). Hence P i recovers F(i,x)=F(x,i) ‏


Download ppt "Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz (University of Maryland) Chiu-Yuen Koo (Google Labs) Ranjit Kumaresan (University."

Similar presentations


Ads by Google