Parallel coin-tossing and constant-round secure two-party computation

被引:81
|
作者
Lindell, Y [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
关键词
secure computation; constant-round protocols; coin-tossing;
D O I
10.1007/s00145-002-0143-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against (polynomial-time) malicious adversaries that may arbitrarily deviate from the protocol specification. This is in contrast to Yao's constant-round protocol that ensures security only in the face of semi-honest adversaries, and to its malicious adversary version that requires a polynomial number of rounds. In order to obtain our result, we present a constant-round protocol for secure coin-tossing of polynomially many coins ( in parallel). We then show how this protocol can be used in conjunction with other existing constructions in order to obtain a constant-round protocol for securely computing any two-party functionality. On the subject of coin-tossing, we also present a constant-round almost perfect coin-tossing protocol, where by "almost perfect" we mean that the resulting coins are guaranteed to be statistically close to uniform ( and not just pseudorandom).
引用
收藏
页码:143 / 184
页数:42
相关论文
共 50 条
  • [41] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [42] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [43] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
  • [44] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [45] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
  • [46] A study of secure two-party circle computation problem
    Liu, Wen
    Luo, Shou-Shan
    Yang, Yi-Xian
    Xin, Yang
    Xiao, Qian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
  • [47] Completeness in Two-Party Secure Computation: A Computational View
    Danny Harnik
    Moni Naor
    Omer Reingold
    Alon Rosen
    Journal of Cryptology, 2006, 19 : 521 - 552
  • [48] Outsourcing secure two-party computation as a black box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2261 - 2275
  • [49] Efficiently Making Secure Two-Party Computation Fair
    Kilinc, Handan
    Kupcu, Alptekin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
  • [50] Outsourcing Secure Two-Party Computation as a Black Box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222