LEGO for Two-Party Secure Computation

被引:0
|
作者
Nielsen, Jesper Buus [1 ]
Orlandi, Claudio [1 ]
机构
[1] Aarhus Univ, Dept Comp Sci, BRICS, DK-8000 Aarhus C, Denmark
关键词
MALICIOUS ADVERSARIES; EFFICIENCY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper continues the recent line of work of making Yao's garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits. Asymptotically it obtains a factor log vertical bar C vertical bar improvement in computation and communication over previous cut-and-choose based solutions, where vertical bar C vertical bar is the size of the circuit being computed. The protocol is universally composable (UC) in the OT-hybrid model against a static, active adversary.
引用
收藏
页码:368 / 386
页数:19
相关论文
共 50 条
  • [21] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [22] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [23] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [24] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [25] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [26] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [27] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
  • [28] A study of secure two-party circle computation problem
    Liu, Wen
    Luo, Shou-Shan
    Yang, Yi-Xian
    Xin, Yang
    Xiao, Qian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
  • [29] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [30] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483