Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

被引:2
|
作者
Hazay, Carmit [1 ]
Yanai, Avishay [1 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
基金
欧洲研究理事会;
关键词
2PC; ORAM; Garbled RAM; Constant-Round;
D O I
10.1007/s00145-019-09321-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that mostly follows the approach for which the desired functionality must be represented as a Boolean circuit. In this work, we design the first constant-round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al. (EUROCRYPT, pp 405-422, 2014) that readily induces a constant round semi-honest two-party protocol for any RAM program assuming identity-based encryption schemes. We show how to enhance the security of their construction into the malicious setting while facing several challenges that stem due to handling the data memory. Next, we show how to apply our techniques to a more recent garbled RAM construction by Garg et al. (STOC, pp 449-458, 2015) that is based on one-way functions.
引用
收藏
页码:1144 / 1199
页数:56
相关论文
共 50 条
  • [1] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Carmit Hazay
    Avishay Yanai
    Journal of Cryptology, 2019, 32 : 1144 - 1199
  • [2] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
  • [3] Parallel coin-tossing and constant-round secure two-party computation
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2003, 16 (03) : 143 - 184
  • [4] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    Journal of Cryptology, 2003, 16 : 143 - 184
  • [5] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
  • [6] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [7] Round-optimal secure two-party computation
    Katz, J
    Ostrovsky, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
  • [8] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [9] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [10] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429