Taming Adaptivity in YOSO Protocols: The Modular Way
Explore the concept of taming adaptivity in YOSO protocols through a modular approach. The research delves into the efficiency, adversary adaptivity, role assignments, and compiler models in synchronous YOSO protocols. The visual presentations illustrate the framework, challenges, and strategies in designing these protocols.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Taming Adaptivity in YOSO Protocols: The Modular Way Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov
Setting ?1 ?2 x1000 ?3 ?4 ?(?1,?2,?3,?4) ?(?) 2
The Adversary x1000 Adaptive corruptions Large corruption threshold ? <? ? 3
Efficiency! x1000 ?(?) 4
Idea Role Outsource the computation to a small subset of parties Assignment 5
You-only-speak-once (YOSO) [GHK+21] Hello! Receive messages anonymously (implicitly via Broadcast) Only speak once Erase secret state first 6
So, what does a (synchronous) YOSO protocol look like? 7
Committees Role Assignment What a mess! 8
The YOSO Model [GHK+ 21] Abstract Natural Desgin protocols Focus on roles in a computation Idealised communication Real machines Must nominate machines for roles Realise communication infrastructure ??? ???? Role Assignment Compiler 9
Compilation = Natural world Natural world Abstract world Abstract world Abstract security Natural security 10
The compiler from [GHK+ 21] Not realised For 1 > ? > ? > 0 ??????? in the ???-hybrid model (UC-)implements ? against ? chosen adaptive chosen adaptive corruptions Information Theoretic Information Theoretic YOSO protocol (YOSO-)implements ? against ? random adaptive random adaptive corruptions Makes heavy use of NCE Natural world Natural world Adaptive adversary ??? ???? Role Assignment Compiler 11
Delayed honest role assignment For each Role: Roles: # Role Probability # + # Assignment 12
Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [m1] [m2] [m3] [?] Can Simulate from static Abstract (static) security Natural (adaptive) security 13
Compilation Abstract world Abstract world Natural world Natural world Static adversary Adaptive adversary [?] Simulation fails!!! 14
The compiler from [GHK+ 21] Requires NCE Role Assignment ?????(?) ????? (?) ????? (?) [?,??] ? ,?? Commits to some nomination (implicitly) Do a random adaptive corruption 15
Is there another way? Role Assignment ?????(?) [?,??] Commits to some nomination (implicitly) 16
Imagine if there was (IND-CCA) PKE Nomminating- committees [BGG+20] & KMNCE [HLH+22] Static roles: [m]R2 [?]R1 Events: Corruptions Activations Role Assignment 17
Our compiler Abstract Natural For 1 > ? > ? > 0 ??????? in the (???,???)-hybrid model (UC-)implements ? against ? chosen chosen adaptive adaptive corruptions Almost any* YOSO protocol (YOSO-)implements ? against ? chosen chosen static static corruptions corruptions corruptions Realise ??? Compiler 18
Summary We present: A new compiler for Synchronous YOSO protocols Get adatpive security from statically secure protocols Only need (KM)NCE for nomincation messages eprint: Thanks for listening! 19