Non-Interactive Secure Computation Based on Cut-and-Choose

被引:0
|
作者
Afshar, Arash [1 ]
Mohassel, Payman [1 ]
Pinkas, Benny [2 ]
Riva, Ben [2 ,3 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
[2] Bar Ilan Univ, IL-52100 Ramat Gan, Israel
[3] Tel Aviv Univ, IL-69978 Tel Aviv, Israel
来源
关键词
2-PARTY COMPUTATION; EFFICIENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, secure two-party computation (2PC) has been demonstrated to be feasible in practice. However, all efficient general-computation 2PC protocols require multiple rounds of interaction between the two players. This property restricts 2PC to be only relevant to scenarios where both players can be simultaneously online, and where communication latency is not an issue. This work considers the model of 2PC with a single round of interaction, called Non-Interactive Secure Computation (NISC). In addition to the non-interaction property, we also consider a flavor of NISC that allows reusing the first message for many different 2PC invocations, possibly with different players acting as the player who sends the second message, similar to a public-key encryption where a single public-key can be used to encrypt many different messages. We present a NISC protocol that is based on the cut-and-choose paradigm of Lindell and Pinkas (Eurocrypt 2007). This protocol achieves concrete efficiency similar to that of best multi-round 2PC protocols based on the cut-and-choose paradigm. The protocol requires only t garbled circuits for achieving cheating probability of 2-t, similar to the recent result of Lindell (Crypto 2013), but only needs a single round of interaction. To validate the efficiency of our protocol, we provide a prototype implementation of it and show experiments that confirm its competitiveness with that of the best multi-round 2PC protocols. This is the first prototype implementation of an efficient NISC protocol. In addition to our NISC protocol, we introduce a new encoding technique that significantly reduces communication in the NISC setting. We further show how our NISC protocol can be improved in the multi-round setting, resulting in a highly efficient constant-round 2PC that is also suitable for pipelined implementation.
引用
收藏
页码:387 / 404
页数:18
相关论文
共 50 条
  • [41] Non-interactive Classical Verification of Quantum Computation
    Alagic, Gorjan
    Childs, Andrew M.
    Grilo, Alex B.
    Hung, Shih-Han
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 153 - 180
  • [42] Non-Interactive and secure outsourcing of PCA-Based face recognition
    Ren, Yanli
    Xu, Xiao
    Feng, Guorui
    Zhang, Xinpeng
    Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):
  • [43] Non-Interactive and secure outsourcing of PCA-Based face recognition
    Ren, Yanli
    Xu, Xiao
    Feng, Guorui
    Zhang, Xinpeng
    COMPUTERS & SECURITY, 2021, 110
  • [44] A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique
    Ning, Lulu
    Wang, Jian
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 49 - 56
  • [45] Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
    Jiang H.
    Xu Q.
    Liu C.
    Zheng Z.
    Tang Y.
    Wang M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (02) : 1327 - 1337
  • [46] Mobile agent protection based on non-interactive secure function evaluation
    Wu, Jian-Jun
    Gao, Ji
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
  • [47] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [48] Cut-and-Choose双向不经意传输
    赵川
    蒋瀚
    魏晓超
    徐秋亮
    软件学报, 2017, 28 (02) : 352 - 360
  • [49] Permutable Cut-and-Choose Oblivious Transfer and Its Application
    Wei, Xiaochao
    Xu, Lin
    Wang, Hao
    Zheng, Zhihua
    IEEE ACCESS, 2020, 8 : 17378 - 17389
  • [50] Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions
    Eriguchi, Reo
    Ohara, Kazuma
    Yamada, Shota
    Nuida, Koji
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 305 - 334