Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

被引:2
|
作者
Hazay, Carmit [1 ]
Yanai, Avishay [1 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
基金
欧洲研究理事会;
关键词
2PC; ORAM; Garbled RAM; Constant-Round;
D O I
10.1007/s00145-019-09321-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that mostly follows the approach for which the desired functionality must be represented as a Boolean circuit. In this work, we design the first constant-round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al. (EUROCRYPT, pp 405-422, 2014) that readily induces a constant round semi-honest two-party protocol for any RAM program assuming identity-based encryption schemes. We show how to enhance the security of their construction into the malicious setting while facing several challenges that stem due to handling the data memory. Next, we show how to apply our techniques to a more recent garbled RAM construction by Garg et al. (STOC, pp 449-458, 2015) that is based on one-way functions.
引用
收藏
页码:1144 / 1199
页数:56
相关论文
共 50 条
  • [31] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    JOURNAL OF THE ACM, 2011, 58 (06)
  • [32] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 14 - 40
  • [33] Secure Two-Party Computation in a Quantum World
    Buescher, Niklas
    Demmler, Daniel
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Kraemer, Juliane
    Rathee, Deevashwer
    Schneider, Thomas
    Struck, Patrick
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
  • [34] Adaptively Secure Two-Party Computation with Erasures
    Lindell, Andrew Y.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
  • [35] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [36] Impossibility of secure two-party classical computation
    Colbeck, Roger
    PHYSICAL REVIEW A, 2007, 76 (06)
  • [37] Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
    Daza, Vanesa
    Makriyannis, Nikolaos
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 581 - 611
  • [38] Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals
    Harmon, Luke
    Delavignette, Gaetan
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 309 - 326
  • [39] Gate evaluation secret sharing and secure one-round two-party computation
    Kolesnikov, V
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 136 - 155
  • [40] Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing
    Liu, Zhusen
    Wang, Weizheng
    Ye, Yutong
    Min, Nan
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7019 - 7032