Security Model
Malicious Adversary
In the malicious setting, each corrupted party can deviate from the protocol, e.g., changing the inputs and outputs, aborting the protocol, etc. To define its security, intuitively we also want to simulate the adversary's view, but such a view cannot be defined in the same way as in the semi-honest setting anymore. In particular, the view depends on the real-world adversary which can change the given inputs and generate whatever outputs. Therefore, the secure two-party computation is defined as the indistinguishability between the outputs (which could be anything, like the adversary's view) of the simulator and the adversary.
Semi-Honest Model
Definition
Let be a functionality. We say that securely compute in the presence of static semi-honest adversaries if there exist probabilistic polynomial-time algorithms and such that
In the semi-honest setting, the parties have to follow the exact pre-specified protocol in the real world, which implies that they cannot change their inputs or outputs. Therefore, the simulators only need to generate an indistinguishable view for each party, given the semi-honest party's input and output.
Last updated