Taming Adaptivity in YOSO Protocols: The Modular Way

Slide Note
Embed
Share

Explore the concept of taming adaptivity in YOSO protocols through a modular approach. The research delves into the efficiency, adversary adaptivity, role assignments, and compiler models in synchronous YOSO protocols. The visual presentations illustrate the framework, challenges, and strategies in designing these protocols.


Uploaded on Sep 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Taming Adaptivity in YOSO Protocols: The Modular Way Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov

  2. Setting ?1 ?2 x1000 ?3 ?4 ?(?1,?2,?3,?4) ?(?) 2

  3. The Adversary x1000 Adaptive corruptions Large corruption threshold ? <? ? 3

  4. Efficiency! x1000 ?(?) 4

  5. Idea Role Outsource the computation to a small subset of parties Assignment 5

  6. You-only-speak-once (YOSO) [GHK+21] Hello! Receive messages anonymously (implicitly via Broadcast) Only speak once Erase secret state first 6

  7. So, what does a (synchronous) YOSO protocol look like? 7

  8. Committees Role Assignment What a mess! 8

  9. The YOSO Model [GHK+ 21] Abstract Natural Desgin protocols Focus on roles in a computation Idealised communication Real machines Must nominate machines for roles Realise communication infrastructure ??? ???? Role Assignment Compiler 9

  10. Compilation = Natural world Natural world Abstract world Abstract world Abstract security Natural security 10

  11. The compiler from [GHK+ 21] Not realised For 1 > ? > ? > 0 ??????? in the ???-hybrid model (UC-)implements ? against ? chosen adaptive chosen adaptive corruptions Information Theoretic Information Theoretic YOSO protocol (YOSO-)implements ? against ? random adaptive random adaptive corruptions Makes heavy use of NCE Natural world Natural world Adaptive adversary ??? ???? Role Assignment Compiler 11

  12. Delayed honest role assignment For each Role: Roles: # Role Probability # + # Assignment 12

  13. Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [m1] [m2] [m3] [?] Can Simulate from static Abstract (static) security Natural (adaptive) security 13

  14. Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [?] Simulation fails!!! 14

  15. The compiler from [GHK+ 21] Requires NCE Role Assignment ?????(?) ????? (?) ????? (?) [?,??] ? ,?? Commits to some nomination (implicitly) Do a random adaptive corruption 15

  16. Is there another way? Role Assignment ?????(?) [?,??] Commits to some nomination (implicitly) 16

  17. Imagine if there was (IND-CCA) PKE Nomminating- committees [BGG+20] & KMNCE [HLH+22] Static roles: [m]R2 [?]R1 Events: Corruptions Activations Role Assignment 17

  18. Our compiler Abstract Natural For 1 > ? > ? > 0 ??????? in the (???,???)-hybrid model (UC-)implements ? against ? chosen chosen adaptive adaptive corruptions Almost any* YOSO protocol (YOSO-)implements ? against ? chosen chosen static static corruptions corruptions corruptions Realise ??? Compiler 18

  19. Summary We present: A new compiler for Synchronous YOSO protocols Get adatpive security from statically secure protocols Only need (KM)NCE for nomincation messages eprint: Thanks for listening! 19

Related