LEGO for Two-Party Secure Computation

被引:0
|
作者
Nielsen, Jesper Buus [1 ]
Orlandi, Claudio [1 ]
机构
[1] Aarhus Univ, Dept Comp Sci, BRICS, DK-8000 Aarhus C, Denmark
关键词
MALICIOUS ADVERSARIES; EFFICIENCY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper continues the recent line of work of making Yao's garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits. Asymptotically it obtains a factor log vertical bar C vertical bar improvement in computation and communication over previous cut-and-choose based solutions, where vertical bar C vertical bar is the size of the circuit being computed. The protocol is universally composable (UC) in the OT-hybrid model against a static, active adversary.
引用
收藏
页码:368 / 386
页数:19
相关论文
共 50 条
  • [31] Completeness in Two-Party Secure Computation: A Computational View
    Danny Harnik
    Moni Naor
    Omer Reingold
    Alon Rosen
    Journal of Cryptology, 2006, 19 : 521 - 552
  • [32] Efficiently Making Secure Two-Party Computation Fair
    Kilinc, Handan
    Kupcu, Alptekin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
  • [33] Outsourcing secure two-party computation as a black box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2261 - 2275
  • [34] Round-optimal secure two-party computation
    Katz, J
    Ostrovsky, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
  • [35] Outsourcing Secure Two-Party Computation as a Black Box
    Carter, Henry
    Mood, Benjamin
    Traynor, Patrick
    Butler, Kevin
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 214 - 222
  • [36] Fair secure two-party computation - Extended abstract
    Pinkas, B
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 87 - 105
  • [37] Efficient two-party secure computation on committed inputs
    Jarecki, Stanislaw
    Shmatikov, Vitaly
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 97 - +
  • [38] A novel quantum scheme for secure two-party distance computation
    Zhen-wan Peng
    Run-hua Shi
    Hong Zhong
    Jie Cui
    Shun Zhang
    Quantum Information Processing, 2017, 16
  • [39] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
  • [40] Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
    Canetti, Ran
    Goldwasser, Shafi
    Poburinnaya, Oxana
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 557 - 585