International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

A Zero-One Law for Deterministic 2-Party Secure Computation

Authors:
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
Download:
URL: http://eprint.iacr.org/2010/098
Search ePrint
Search Google
Abstract: We use security in the Universal Composition framework as a means to study the ``cryptographic complexity'' of 2-party secure computation tasks (functionalities). We say that a functionality $F$ {\em reduces to} another functionality $G$ if there is a UC-secure protocol for $F$ using ideal access to $G$. This reduction is a natural and fine-grained way to compare the relative complexities of cryptographic tasks. There are two natural ``extremes'' of complexity under the reduction: the {\em trivial} functionalities, which can be reduced to any other functionality; and the {\em complete} functionalities, to which any other functionality can be reduced. In this work we show that under a natural computational assumption (the existence of a protocol for oblivious transfer secure against semi-honest adversaries), there is a {\bf zero-one law} for the cryptographic complexity of 2-party deterministic functionalities. Namely, {\em every such functionality is either trivial or complete.} No other qualitative distinctions exist among functionalities, under this computational assumption. While nearly all previous work classifying multi-party computation functionalities has been restricted to the case of secure function evaluation, our results are the first to consider completeness of arbitrary {\em reactive} functionalities, which receive input and give output repeatedly throughout several rounds of interaction. One important technical contribution in this work is to initiate the comprehensive study of the cryptographic properties of reactive functionalities. We model these functionalities as finite automata and develop an automata-theoretic methodology for classifying and studying their cryptographic properties. Consequently, we completely characterize the reactive behaviors that lead to cryptographic non-triviality. Another contribution of independent interest is to optimize the hardness assumption used by Canetti et al.\ (STOC 2002) in showing that the common random string functionality is complete (a result independently obtained by Damg{\aa}rd et al.\ (TCC 2010)).
BibTeX
@misc{eprint-2010-22999,
  title={A Zero-One Law for Deterministic 2-Party Secure Computation},
  booktitle={IACR Eprint archive},
  keywords={foundations / multi-party computation, cryptographic complexity, universal composition, completeness, reactive functionalities},
  url={http://eprint.iacr.org/2010/098},
  note={ mikero@cs.umt.edu 14662 received 22 Feb 2010},
  author={Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek},
  year=2010
}