Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

被引:4
|
作者
Yehuda Lindell
Benny Pinkas
机构
[1] Bar-Ilan University,Dept. of Computer Science
来源
Journal of Cryptology | 2012年 / 25卷
关键词
Secure two-party computation; Malicious adversaries; Cut-and-choose; Concrete efficiency;
D O I
暂无
中图分类号
学科分类号
摘要
Protocols for secure two-party computation enable a pair of parties to compute a function of their inputs while preserving security properties such as privacy, correctness and independence of inputs. Recently, a number of protocols have been proposed for the efficient construction of two-party computation secure in the presence of malicious adversaries (where security is proven under the standard simulation-based ideal/real model paradigm for defining security). In this paper, we present a protocol for this task that follows the methodology of using cut-and-choose to boost Yao’s protocol to be secure in the presence of malicious adversaries. Relying on specific assumptions (DDH), we construct a protocol that is significantly more efficient and far simpler than the protocol of Lindell and Pinkas (Eurocrypt 2007) that follows the same methodology. We provide an exact, concrete analysis of the efficiency of our scheme and demonstrate that (at least for not very small circuits) our protocol is more efficient than any other known today.
引用
收藏
页码:680 / 722
页数:42
相关论文
共 50 条
  • [41] Secure Two-Party Computation in a Quantum World
    Buescher, Niklas
    Demmler, Daniel
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Kraemer, Juliane
    Rathee, Deevashwer
    Schneider, Thomas
    Struck, Patrick
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
  • [42] Adaptively Secure Two-Party Computation with Erasures
    Lindell, Andrew Y.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
  • [43] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [44] Impossibility of secure two-party classical computation
    Colbeck, Roger
    PHYSICAL REVIEW A, 2007, 76 (06)
  • [45] Oblivious and Fair Server-Aided Two-Party Computation
    Herzberg, Amir
    Shulman, Haya
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 75 - 84
  • [46] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [47] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [48] A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
    Haines, Thomas
    Muller, Johannes
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 293 - 308
  • [49] Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
    Lindell, Yehuda
    Riva, Ben
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 476 - 494
  • [50] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730