International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On the Structure of Unconditional UC Hybrid Protocols

Authors:
Mike Rosulek
Morgan Shirley
Download:
DOI: 10.1007/978-3-030-03810-6_4
Search ePrint
Search Google
Conference: TCC 2018
Abstract: We study the problem of secure two-party computation in the presence of a trusted setup. If there is an unconditionally UC-secure protocol for f that makes use of calls to an ideal g, then we say that freduces tog (and write $$f \sqsubseteq g$$). Some g are complete in the sense that all functions reduce to g. However, almost nothing is known about the power of an incomplete g in this setting. We shed light on this gap by showing a characterization of $$f \sqsubseteq g$$ for incomplete g.Very roughly speaking, we show that f reduces to g if and only if it does so by the simplest possible protocol: one that makes a single call to ideal g and uses no further communication. Furthermore, such simple protocols can be characterized by a natural combinatorial condition on f and g.Looking more closely, our characterization applies only to a very wide class of f, and only for protocols that are deterministic or logarithmic-round. However, we give concrete examples showing that both of these limitations are inherent to the characterization itself. Functions not covered by our characterization exhibit qualitatively different properties. Likewise, randomized, superlogarithmic-round protocols are qualitatively more powerful than deterministic or logarithmic-round ones.
BibTeX
@inproceedings{tcc-2018-29030,
  title={On the Structure of Unconditional UC Hybrid Protocols},
  booktitle={Theory of Cryptography},
  series={Theory of Cryptography},
  publisher={Springer},
  volume={11240},
  pages={98-126},
  doi={10.1007/978-3-030-03810-6_4},
  author={Mike Rosulek and Morgan Shirley},
  year=2018
}