Non-Interactive Secure Computation Based on Cut-and-Choose

被引:0
|
作者
Afshar, Arash [1 ]
Mohassel, Payman [1 ]
Pinkas, Benny [2 ]
Riva, Ben [2 ,3 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Bar Ilan Univ, IL-52100 Ramat Gan, Israel
[3] Tel Aviv Univ, IL-69978 Tel Aviv, Israel
来源
关键词
2-PARTY COMPUTATION; EFFICIENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, secure two-party computation (2PC) has been demonstrated to be feasible in practice. However, all efficient general-computation 2PC protocols require multiple rounds of interaction between the two players. This property restricts 2PC to be only relevant to scenarios where both players can be simultaneously online, and where communication latency is not an issue. This work considers the model of 2PC with a single round of interaction, called Non-Interactive Secure Computation (NISC). In addition to the non-interaction property, we also consider a flavor of NISC that allows reusing the first message for many different 2PC invocations, possibly with different players acting as the player who sends the second message, similar to a public-key encryption where a single public-key can be used to encrypt many different messages. We present a NISC protocol that is based on the cut-and-choose paradigm of Lindell and Pinkas (Eurocrypt 2007). This protocol achieves concrete efficiency similar to that of best multi-round 2PC protocols based on the cut-and-choose paradigm. The protocol requires only t garbled circuits for achieving cheating probability of 2-t, similar to the recent result of Lindell (Crypto 2013), but only needs a single round of interaction. To validate the efficiency of our protocol, we provide a prototype implementation of it and show experiments that confirm its competitiveness with that of the best multi-round 2PC protocols. This is the first prototype implementation of an efficient NISC protocol. In addition to our NISC protocol, we introduce a new encoding technique that significantly reduces communication in the NISC setting. We further show how our NISC protocol can be improved in the multi-round setting, resulting in a highly efficient constant-round 2PC that is also suitable for pipelined implementation.
引用
收藏
页码:387 / 404
页数:18
相关论文
共 50 条
  • [31] Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
    Lindell, Yehuda
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 1 - 17
  • [32] Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing
    Obana, Satoshi
    Yoshida, Maki
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 322 - 329
  • [33] Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    Kohl, Lisa
    Rindal, Peter
    Scholl, Peter
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 291 - 308
  • [34] A SECURE GROUP COMMUNICATION USING NON-INTERACTIVE KEY COMPUTATION IN MULTIPARTY KEY AGREEMENT
    Kalaiselvi, S.
    Begum, S. Jabeen
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 568 - 572
  • [35] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [36] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [37] DUPLO: Unifying Cut-and-Choose for Garbled Circuits
    Kolesnikov, Vladimir
    Nielsen, Jesper Buus
    Rosulek, Mike
    Trieu, Ni
    Trifiletti, Roberto
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 3 - 20
  • [38] On Cut-and-Choose Oblivious Transfer and Its Variants
    Kolesnikov, Vladimir
    Kumaresan, Ranjit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 386 - 412
  • [39] Secure Non-interactive Simulation: Feasibility and Rate
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 767 - 796
  • [40] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100