---
res:
  bibo_abstract:
  - "We study Multi-party computation (MPC) in the setting of subversion, where the
    adversary tampers with the machines of honest parties. Our goal is to construct
    actively secure MPC protocols where parties are corrupted adaptively by an adversary
    (as in the standard adaptive security setting), and in addition, honest parties’
    machines are compromised.\r\nThe idea of reverse firewalls (RF) was introduced
    at EUROCRYPT’15 by Mironov and Stephens-Davidowitz as an approach to protecting
    protocols against corruption of honest parties’ devices. Intuitively, an RF for
    a party   P  is an external entity that sits between   P  and the outside world
    and whose scope is to sanitize   P ’s incoming and outgoing messages in the face
    of subversion of their computer. Mironov and Stephens-Davidowitz constructed a
    protocol for passively-secure two-party computation. At CRYPTO’20, Chakraborty,
    Dziembowski and Nielsen constructed a protocol for secure computation with firewalls
    that improved on this result, both by extending it to multi-party computation
    protocol, and considering active security in the presence of static corruptions.
    In this paper, we initiate the study of RF for MPC in the adaptive setting. We
    put forward a definition for adaptively secure MPC in the reverse firewall setting,
    explore relationships among the security notions, and then construct reverse firewalls
    for MPC in this stronger setting of adaptive security. We also resolve the open
    question of Chakraborty, Dziembowski and Nielsen by removing the need for a trusted
    setup in constructing RF for MPC. Towards this end, we construct reverse firewalls
    for adaptively secure augmented coin tossing and adaptively secure zero-knowledge
    protocols and obtain a constant round adaptively secure MPC protocol in the reverse
    firewall setting without setup. Along the way, we propose a new multi-party adaptively
    secure coin tossing protocol in the plain model, that is of independent interest.@eng"
  bibo_authorlist:
  - foaf_Person:
      foaf_givenName: Suvradip
      foaf_name: Chakraborty, Suvradip
      foaf_surname: Chakraborty
      foaf_workInfoHomepage: http://www.librecat.org/personId=B9CD0494-D033-11E9-B219-A439E6697425
  - foaf_Person:
      foaf_givenName: Chaya
      foaf_name: Ganesh, Chaya
      foaf_surname: Ganesh
  - foaf_Person:
      foaf_givenName: Mahak
      foaf_name: Pancholi, Mahak
      foaf_surname: Pancholi
  - foaf_Person:
      foaf_givenName: Pratik
      foaf_name: Sarkar, Pratik
      foaf_surname: Sarkar
  bibo_doi: 10.1007/978-3-030-92075-3_12
  bibo_volume: 13091
  dct_date: 2021^xs_gYear
  dct_identifier:
  - UT:000927876200012
  dct_isPartOf:
  - http://id.crossref.org/issn/0302-9743
  - http://id.crossref.org/issn/1611-3349
  - http://id.crossref.org/issn/978-3-030-92074-6
  dct_language: eng
  dct_publisher: Springer Nature@
  dct_title: Reverse firewalls for adaptively secure MPC without setup@
...
