Efficient two-party secure computation on committed inputs

被引:0
|
作者
Jarecki, Stanislaw [1 ]
Shmatikov, Vitaly [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92717 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an efficient construction of Yao's "garbled circuits" protocol for securely computing any two-party circuit on committed inputs. The protocol is secure in a universally composable way in the presence of malicious adversaries under the decisional composite residuosity (DCR) and strong RSA assumptions, in the common reference string model. The protocol requires a constant number of rounds (four-five in the standard model, two-three in the random oracle model, depending on whether both parties receive the output), O(vertical bar C vertical bar) modular exponentiations per player, and a bandwidth of O(vertical bar C vertical bar) group elements, where vertical bar C vertical bar is the size of the computed circuit. Our technical tools are of independent interest. We propose a homomorphic, semantically secure variant of the Camenisch-Shoup verifiable cryptosystem, which uses shorter keys, is unambiguous (it is infeasible to generate two keys which successfully decrypt the same ciphertext), and allows efficient proofs that a committed plaintext is encrypted under a committed key. Our second tool is a practical four-round (two-round in ROM) protocol for committed oblivious transfer on strings (string-COT) secure against malicious participants. The string-COT protocol takes a few exponentiations per player, and is UC-secure under the DCR assumption in the common reference string model. Previous protocols of comparable efficiency achieved either committed OT on bits, or standard (non-committed) OT on strings.
引用
收藏
页码:97 / +
页数:3
相关论文
共 50 条
  • [31] Impossibility of secure two-party classical computation
    Colbeck, Roger
    PHYSICAL REVIEW A, 2007, 76 (06)
  • [32] Secure Two-Party Computation in a Quantum World
    Buescher, Niklas
    Demmler, Daniel
    Karvelas, Nikolaos P.
    Katzenbeisser, Stefan
    Kraemer, Juliane
    Rathee, Deevashwer
    Schneider, Thomas
    Struck, Patrick
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 461 - 480
  • [33] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 14 - 40
  • [34] Adaptively Secure Two-Party Computation with Erasures
    Lindell, Andrew Y.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 117 - 132
  • [35] Secure Two-Party Computation: A Visual Way
    D'Arco, Paolo
    De Prisco, Roberto
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 18 - 38
  • [36] Efficient Secure Two-Party Exponentiation
    Yu, Ching-Hua
    Chow, Sherman S. M.
    Chung, Kai-Min
    Liu, Feng-Hao
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
  • [37] Efficient Covert Two-Party Computation
    Jarecki, Stanislaw
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 644 - 674
  • [38] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [39] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [40] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
    Huang, Yan
    Katz, Jonathan
    Evans, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35