Concurrently Secure Computation in Constant Rounds

被引:0
|
作者
Garg, Sanjam [1 ]
Goyal, Vipul [2 ]
Jain, Abhishek [1 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] MSR India, Hyderabad, Andhra Pradesh, India
来源
关键词
ZERO-KNOWLEDGE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, meaningful relaxed notions of concurrent security have been achieved. The main contribution of our work is a new technique useful for designing protocols in the concurrent setting (in the plain model). The core of our technique is a new rewinding-based extraction procedure which only requires the protocol to have a constant number of rounds. We show two main applications of our technique. We obtain the first concurrently secure computation protocol in the plain model with super-polynomial simulation (SPS) security that uses only a constant number of rounds and requires only standard assumptions. In contrast, the only previously known result (Canetti et al., FOCS'10) achieving SPS security based on standard assumptions requires polynomial number of rounds. Our second contribution is a new definition of input indistinguishable computation (IIC) and a constant round protocols satisfying that definition. Our definition of input indistinguishable computation is a simplification and strengthening of the definition of Micali et al. (FOCS'06) in various directions. Most notably, our definition provides meaningful security guarantees even for randomized functionalities.
引用
收藏
页码:99 / 116
页数:18
相关论文
共 50 条
  • [1] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [2] Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
    Dachman-Soled, Dana
    Katz, Jonathan
    Rao, Vanishree
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 586 - 613
  • [3] Perfect Secure Computation in Two Rounds
    Applebaum, Benny
    Brakerski, Zvika
    Tsabary, Rotem
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 152 - 174
  • [4] PERFECT SECURE COMPUTATION IN TWO ROUNDS
    Applebaum, Benny
    Brakerski, Zvika
    Tsabary, Rotem
    SIAM JOURNAL ON COMPUTING, 2021, 50 (01) : 68 - 97
  • [5] Bounded-concurrent secure two-party computation in a constant number of rounds
    Pass, R
    Rosen, A
    44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 404 - 413
  • [6] Positive Results for Concurrently Secure Computation in the Plain Model
    Goyal, Vipul
    2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2012, : 41 - 50
  • [7] Concurrently Composable Non-interactive Secure Computation
    Morgan, Andrew
    Pass, Rafael
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 526 - 555
  • [8] On Concurrently Secure Computation in the Multiple Ideal Query Model
    Goyal, Vipul
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 684 - 701
  • [9] Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    Damgard, Ivan
    Fitzi, Matthias
    Kiltz, Eike
    Nielsen, Jesper Buus
    Toft, Tomas
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 285 - 304
  • [10] Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 163 - 193