Taming Adaptivity in YOSO Protocols: The Modular Way

 
Taming Adaptivity in YOSO Protocols:
 The Modular Way
 
Ran Canetti, 
Sebastian Kolby
, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
Setting
2
 
The Adversary
 
 
x1000
 
3
 
Efficiency!
 
 
x1000
 
4
Idea
Outsource the computation to a small subset of parties
Role
Assignment
5
You-only-speak-once (YOSO) [GHK
+
21]
Hello!
 
Receive messages anonymously
(implicitly via Broadcast)
Only speak once
Erase secret state first
6
 
So, what does a (synchronous)
YOSO protocol look like?
 
7
Committees
Role
Assignment
8
 
What a mess!
The YOSO Model [GHK
+ 
21]
9
Compilation
10
The compiler from [GHK
+ 
21]
 
Makes heavy use
of NCE
11
Delayed honest role assignment
Roles:
Role
Assignment
For each Role:
12
Compilation
Static adversary
Adaptive adversary
Abstract world
Natural world
Can Simulate
from static
[?]
[m1]
[m2]
[m3]
13
 
Compilation
 
Static adversary
 
Adaptive adversary
 
Abstract world
 
Natural world
 
Simulation fails!!!
 
[?]
 
14
The compiler from [GHK
+ 
21]
Role
Assignment
15
Is there another way?
Role
Assignment
16
Imagine if there was
Static roles:
17
Our compiler
Abstract
Natural
18
Summary
We present:
A new compiler for Synchronous YOSO protocols
Get 
adatpive
 security from statically secure protocols
Only need (KM)NCE for nomincation messages
19
Slide Note
Embed
Share

Explore the concept of taming adaptivity in YOSO protocols through a modular approach. The research delves into the efficiency, adversary adaptivity, role assignments, and compiler models in synchronous YOSO protocols. The visual presentations illustrate the framework, challenges, and strategies in designing these protocols.

  • YOSO Protocols
  • Modular Approach
  • Adversary Adaptivity
  • Role Assignments
  • Synchronous Protocol

Uploaded on Sep 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Taming Adaptivity in YOSO Protocols: The Modular Way Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov

  2. Setting ?1 ?2 x1000 ?3 ?4 ?(?1,?2,?3,?4) ?(?) 2

  3. The Adversary x1000 Adaptive corruptions Large corruption threshold ? <? ? 3

  4. Efficiency! x1000 ?(?) 4

  5. Idea Role Outsource the computation to a small subset of parties Assignment 5

  6. You-only-speak-once (YOSO) [GHK+21] Hello! Receive messages anonymously (implicitly via Broadcast) Only speak once Erase secret state first 6

  7. So, what does a (synchronous) YOSO protocol look like? 7

  8. Committees Role Assignment What a mess! 8

  9. The YOSO Model [GHK+ 21] Abstract Natural Desgin protocols Focus on roles in a computation Idealised communication Real machines Must nominate machines for roles Realise communication infrastructure ??? ???? Role Assignment Compiler 9

  10. Compilation = Natural world Natural world Abstract world Abstract world Abstract security Natural security 10

  11. The compiler from [GHK+ 21] Not realised For 1 > ? > ? > 0 ??????? in the ???-hybrid model (UC-)implements ? against ? chosen adaptive chosen adaptive corruptions Information Theoretic Information Theoretic YOSO protocol (YOSO-)implements ? against ? random adaptive random adaptive corruptions Makes heavy use of NCE Natural world Natural world Adaptive adversary ??? ???? Role Assignment Compiler 11

  12. Delayed honest role assignment For each Role: Roles: # Role Probability # + # Assignment 12

  13. Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [m1] [m2] [m3] [?] Can Simulate from static Abstract (static) security Natural (adaptive) security 13

  14. Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [?] Simulation fails!!! 14

  15. The compiler from [GHK+ 21] Requires NCE Role Assignment ?????(?) ????? (?) ????? (?) [?,??] ? ,?? Commits to some nomination (implicitly) Do a random adaptive corruption 15

  16. Is there another way? Role Assignment ?????(?) [?,??] Commits to some nomination (implicitly) 16

  17. Imagine if there was (IND-CCA) PKE Nomminating- committees [BGG+20] & KMNCE [HLH+22] Static roles: [m]R2 [?]R1 Events: Corruptions Activations Role Assignment 17

  18. Our compiler Abstract Natural For 1 > ? > ? > 0 ??????? in the (???,???)-hybrid model (UC-)implements ? against ? chosen chosen adaptive adaptive corruptions Almost any* YOSO protocol (YOSO-)implements ? against ? chosen chosen static static corruptions corruptions corruptions Realise ??? Compiler 18

  19. Summary We present: A new compiler for Synchronous YOSO protocols Get adatpive security from statically secure protocols Only need (KM)NCE for nomincation messages eprint: Thanks for listening! 19

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#