An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

被引:0
|
作者
Yehuda Lindell
Benny Pinkas
机构
[1] Bar-Ilan University,Department of Computer Science
来源
Journal of Cryptology | 2015年 / 28卷
关键词
Secure two-party computation; Yao’s protocol; Real/ideal simulation paradigm; Security against malicious adversaries;
D O I
暂无
中图分类号
学科分类号
摘要
We show an efficient secure two-party protocol, based on Yao’s construction, which provides security against malicious adversaries. Yao’s original protocol is only secure in the presence of semi-honest adversaries, and can be transformed into a protocol that achieves security against malicious adversaries by applying the compiler of Goldreich, Micali, and Wigderson (the “GMW compiler”). However, this approach does not seem to be very practical as it requires using generic zero-knowledge proofs. Our construction is based on applying cut-and-choose techniques to the original circuit and inputs. Security is proved according to the ideal/real simulation paradigm, and the proof is in the standard model (with no random oracle model or common reference string assumptions). The resulting protocol is computationally efficient: the only usage of asymmetric cryptography is for running O(1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(1)$$\end{document} oblivious transfers for each input bit (or for each bit of a statistical security parameter, whichever is larger). Our protocol combines techniques from folklore (like cut-and-choose) along with new techniques for efficiently proving consistency of inputs. We remark that a naive implementation of the cut-and-choose technique with Yao’s protocol does not yield a secure protocol. This is the first paper to show how to properly implement these techniques, and to provide a full proof of security. Our protocol can also be interpreted as a constant-round black-box reduction of secure two-party computation to oblivious transfer and perfectly hiding commitments, or a black-box reduction of secure two-party computation to oblivious transfer alone, with a number of rounds which is linear in a statistical security parameter. These two reductions are comparable to Kilian’s (20th STOC, 1988) reduction, which uses OT alone but incurs a number of rounds which is linear in the depth of the circuit.
引用
收藏
页码:312 / 350
页数:38
相关论文
共 50 条
  • [1] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [2] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [3] Secure two-party computation of Squared Euclidean Distances in the presence of malicious adversaries
    Mouffron, Marc
    Rousseau, Frederic
    Zhu, Huafei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 138 - 152
  • [4] Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks
    Yang, Xiaoyi
    Huang, Meijuan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 441 - 450
  • [5] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [6] Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    Smart, Nigel P.
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 2 - +
  • [7] Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison
    Gong, Linming
    Li, Shundong
    Wu, Chunying
    Wang, Daoshun
    [J]. IEEE ACCESS, 2018, 6 : 25532 - 25542
  • [8] An improved secure two-party computation protocol
    Yu, Y
    Leiwo, J
    Premkumar, B
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 221 - 232
  • [9] An efficient fair UC-secure protocol for two-party computation
    Ruan, Ou
    Chen, Jing
    Zhou, Jing
    Cui, Yongquan
    Zhang, Mingwu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1253 - 1263
  • [10] Efficient Fair Secure Two-Party Computation
    Ruan, Ou
    Zhou, Jing
    Zheng, Minghui
    Cui, Guohua
    [J]. 2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248