3 NEED FOR SIMULATION
BASED APPROACH FOR
REALIZING PRIVACY
Definitions of privacy are based on indistinguishabil-
ity of certain probability distributions. The discussion
below has been presented keeping in mind the input
indistinguishability type approach presented in (Kil-
ian et al., 1994) for stand alone settings (and (Garay
and Ostrovsky, 2008) for a.e.s.c.). We rigorously ar-
gue why straightforward hybrid argument is limited
in dealing with complex mathematical structure of
views of parties, generated from execution of uncon-
ditional MPC protocols when malicious corruptions
are allowed.
Let C denote the subset of corrupted parties and
P−C be the subset of honest parties. Let the vector
of initial input values and committed input values by
the corrupted parties be
−→
y
C
and
−→
x
C
respectively and
o = f(
−→
x ) be the output generated from the computa-
tion. Let view
A
−→
y ,
−→
x ,o
denote the distribution of views
of the adversary generated from executions of mul-
tiparty protocol, when parties start with initial input
vector
−→
y , commit to input vector
−→
x and compute out-
put o. Input indistinguishability says that: As long as
the adversary starts with the same initial input vec-
tor
−→
y
C
, commits to same input vector
−→
x
C
and same
output o is computed, the distribution of views of the
adversary A generated is the same. This is true for
all the different multiparty executions corresponding
to different vectors of input values of honest parties
(
−→
y
1
P−C
=
−→
x
1
P−C
,
−→
y
2
P−C
=
−→
x
2
P−C
, . . . ). The underly-
ing interpretation is that the view of the adversary is
not anymore helpful in distinguishing between differ-
ent candidates of input vectors of honest parties, than
what can be inferred from vector of committed input
value(s) of corrupted parties and the computed output
value alone.
Now let us see why straightforward hybrid argu-
ment has limitations in realizing Input Indistinguisha-
bility type definition of privacy, when Byzantine cor-
ruptions are allowed. During the execution of (uncon-
ditional) secure multiparty protocols, parties commit
to certain secrets (e.g., the input value during the com-
mitment phase of BGW protocol). This is achieved
by executing a protocol for secret sharing called Ver-
ifiable Secret Sharing (VSS): The committing party
shares its secret input value by sending evaluations
of a polynomial to the rest of the parties. The par-
ties then exchange sub-shares of these shares between
themselves to make sure that the secret value com-
mitted by the committing party is valid, and can be
recovered by the honest parties. A malicious party
may send incongruent shares of its secret/share-of-
secret to other honest parties or other corrupted par-
ties. When honest parties later tally the values of
their sub-shares they would not concur. Alterna-
tively, some corrupted parties may raise a false alarm
about the mismatch of subshare values. The parties
then seek to resolve the inconsistencies by executing
a ”disavowal” sub-protocol in which the committing
party may be asked to (publicly) declare the correct
shares/sub-shares of the contentious parties. The exe-
cution of this disavowal sub-protocol can happen due
to variety of such reasons and results in execution
of different/lengthier sequence of steps of the BGW
protocol compared to when it is not executed at all.
Whether the ”disavowal” protocol is executed once
or more, what leads to its execution, and how many
times it is executed depends on the dynamic choices
made by the corrupted parties during the execution of
the protocol. Thus, the actual lengths and contents of
the views of all parties, including the adversary, can
vary drastically, from one execution of BGW protocol
to another. This is true even if all the parameters (like
initial value, committed value and output value) of the
parties are same.
A straightforward hybrid argument cannot be ap-
plied to compare two probability distributions on
variable length views of adversary. This is due to
the following reason. A hybrid argument (HA) is
used to argue indistinguishability of two random vari-
ables X[1, . . . , m] and Y[1, . . . , m] that have the same
length/size m. A typical HA proceeds as follows:
Let random variables X[1, . . . , m] 6≈ Y[1, . . . , m]. Then,
for some i ∈ [m] : X[i] 6≈ Y[i]. It is now argued that
X[i] 6≈ Y[i] is not possible. From this it is concluded
that X[1, . . . , m] ≈ Y[1, . . . , m]. When only honest-but-
curious type passive corruption is allowed the sizes of
the views are fixed and such a HA can be employed
to realize input indistinguishability. However, when
malicious corruptions are allowed, the lengths of the
views of the adversary can be variable. Thus, sup-
port of probability distributions on views of adversary
from which X andY are drawn, may consist of strings
of vastly different lengths. Arguing indistinguisha-
bility of such random variables calls for a sequential
inductive argument of the following type: First argue
the indistinguishability of the first bit of two random
variables. Then, conditioned on the fact that first bits
are indistinguishable, argue the indistinguishability of
the second two bits of the random variables. So on
and so forth. In context of BGW protocol, the argu-
ment would proceed by comparing the distribution of
views of adversary, generated from two different sce-
narios, after every ’round/super-round’ of the proto-
col. We present such an argument in (Vaya, 2007) by
adapting the concept of simulator inherent in defini-
SECRYPT 2010 - International Conference on Security and Cryptography
272