Efficiency tradeoffs for malicious two-party computation

被引:0
|
作者
Mohassel, Payman [1 ]
Franklin, Matthew [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
secure two-party computation; secure function evaluation; Yao's garbled circuit; malicious adversary;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study efficiency tradeoffs for secure two-party computation in presence of malicious behavior. We investigate two main approaches for defending against malicious behavior in Yao's garbled circuit method: (1) Committed-input scheme, (2) Equality-checker scheme. We provide asymptotic and concrete analysis of communication and computation costs of the designed protocols. We also develop a weaker definition of security (k-leaked model) for malicious two-party computation that allows for disclosure of some information to a malicious party. We design more efficient variations of Yao's protocol that are secure in the proposed model.
引用
收藏
页码:458 / 473
页数:16
相关论文
共 50 条
  • [1] Revisiting the efficiency of malicious two-party computation
    Woodruff, David P.
    Advances in Cryptology - EUROCRYPT 2007, 2007, 4515 : 79 - 96
  • [2] Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    Smart, Nigel P.
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 2 - +
  • [3] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    Journal of Cryptology, 2015, 28 : 312 - 350
  • [4] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [5] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [6] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries
    Mouffron, Marc
    Rousseau, Frederic
    Zhu, Huafei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
  • [7] Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks
    Yang, Xiaoyi
    Huang, Meijuan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 441 - 450
  • [8] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [9] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [10] On Statistical Security in Two-Party Computation
    Khurana, Dakshita
    Mughees, Muhammad Haris
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 532 - 561