LEGO for Two-Party Secure Computation

被引:0
|
作者
Nielsen, Jesper Buus [1 ]
Orlandi, Claudio [1 ]
机构
[1] Aarhus Univ, Dept Comp Sci, BRICS, DK-8000 Aarhus C, Denmark
关键词
MALICIOUS ADVERSARIES; EFFICIENCY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper continues the recent line of work of making Yao's garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits. Asymptotically it obtains a factor log vertical bar C vertical bar improvement in computation and communication over previous cut-and-choose based solutions, where vertical bar C vertical bar is the size of the circuit being computed. The protocol is universally composable (UC) in the OT-hybrid model against a static, active adversary.
引用
收藏
页码:368 / 386
页数:19
相关论文
共 50 条
  • [41] Towards Characterizing Complete Fairness in Secure Two-Party Computation
    Asharov, Gilad
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 291 - 316
  • [42] A novel quantum solution to secure two-party distance computation
    Peng, Zhen-wan
    Shi, Run-hua
    Wang, Pan-hong
    Zhang, Shun
    QUANTUM INFORMATION PROCESSING, 2018, 17 (06)
  • [43] One-Sided Adaptively Secure Two-Party Computation
    Hazay, Carmit
    Patra, Arpita
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 368 - 393
  • [44] Legally-enforceable fairness in secure two-party computation
    Lindell, Andrew Y.
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 121 - 137
  • [45] Rational adversary with flexible utility in secure two-party computation
    Wang, Yilei
    Zhang, Shuaifeng
    Tang, Yi
    Su, Qingtang
    Chen, Beijing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 2913 - 2927
  • [46] Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation
    Wang, Ye
    Ishwar, Prakash
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1303 - 1307
  • [47] Rational adversary with flexible utility in secure two-party computation
    Yilei Wang
    Shuaifeng Zhang
    Yi Tang
    Qingtang Su
    Beijing Chen
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2913 - 2927
  • [48] Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
    Ziegeldorf, Jan Henrik
    Metzke, Jan
    Henze, Martin
    Wehrle, Klaus
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 198 - 205
  • [49] Secure Two-Party Computation over a Z-Channel
    Palmieri, Paolo
    Pereira, Olivier
    PROVABLE SECURITY, 2011, 6980 : 3 - 15
  • [50] Hiding the Input-Size in Secure Two-Party Computation
    Lindell, Yehuda
    Nissim, Kobbi
    Orlandi, Claudio
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 421 - 440