Concurrently Secure Computation in Constant Rounds

被引:0
|
作者
Garg, Sanjam [1 ]
Goyal, Vipul [2 ]
Jain, Abhishek [1 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] MSR India, Hyderabad, Andhra Pradesh, India
来源
关键词
ZERO-KNOWLEDGE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, meaningful relaxed notions of concurrent security have been achieved. The main contribution of our work is a new technique useful for designing protocols in the concurrent setting (in the plain model). The core of our technique is a new rewinding-based extraction procedure which only requires the protocol to have a constant number of rounds. We show two main applications of our technique. We obtain the first concurrently secure computation protocol in the plain model with super-polynomial simulation (SPS) security that uses only a constant number of rounds and requires only standard assumptions. In contrast, the only previously known result (Canetti et al., FOCS'10) achieving SPS security based on standard assumptions requires polynomial number of rounds. Our second contribution is a new definition of input indistinguishable computation (IIC) and a constant round protocols satisfying that definition. Our definition of input indistinguishable computation is a simplification and strengthening of the definition of Micali et al. (FOCS'06) in various directions. Most notably, our definition provides meaningful security guarantees even for randomized functionalities.
引用
收藏
页码:99 / 116
页数:18
相关论文
共 50 条
  • [31] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
  • [32] Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
    Canetti, Ran
    Poburinnaya, Oxana
    Venkitasubramaniam, Muthuramakrishnan
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 497 - 509
  • [33] A protocol to achieve independence in constant rounds
    Gennaro, R
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2000, 11 (07) : 636 - 647
  • [34] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [35] Perfectly Secure Message Transmission in Two Rounds
    Spini, Gabriele
    Zemor, Gilles
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 286 - 304
  • [36] Secure Outsourced Computation
    Loftus, Jake
    Smart, Nigel P.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 1 - 20
  • [37] Introduction to secure computation
    Cramer, R
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 16 - 62
  • [38] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    COMPUTER, 2015, 48 (04) : 78 - 81
  • [39] Resettably Secure Computation
    Goyal, Vipul
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 54 - 71
  • [40] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    Journal of Cryptology, 2003, 16 : 143 - 184