Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

被引:1
|
作者
Hazay, Carmit [1 ]
Yanai, Avishay [1 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
基金
欧洲研究理事会;
关键词
2PC; ORAM; Garbled RAM; Constant-Round;
D O I
10.1007/s00145-019-09321-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that mostly follows the approach for which the desired functionality must be represented as a Boolean circuit. In this work, we design the first constant-round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al. (EUROCRYPT, pp 405-422, 2014) that readily induces a constant round semi-honest two-party protocol for any RAM program assuming identity-based encryption schemes. We show how to enhance the security of their construction into the malicious setting while facing several challenges that stem due to handling the data memory. Next, we show how to apply our techniques to a more recent garbled RAM construction by Garg et al. (STOC, pp 449-458, 2015) that is based on one-way functions.
引用
收藏
页码:1144 / 1199
页数:56
相关论文
共 50 条
  • [41] A new entropic criterion model in rational secure two-party computation
    Xinyu Zhang
    Yujun Liu
    Yuling Chen
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1363 - 1372
  • [42] Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing
    Liu, Zhusen
    Wang, Weizheng
    Ye, Yutong
    Min, Nan
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7019 - 7032
  • [43] A new entropic criterion model in rational secure two-party computation
    Zhang, Xinyu
    Liu, Yujun
    Chen, Yuling
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1363 - 1372
  • [44] Secure Two-Party Computation Based on Blind Quantum Computation
    Zhu, Yaqing
    Li, Qin
    Liu, Chengdong
    Sun, Zhiwei
    Peng, Yu
    Shen, Dongsu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (07) : 2074 - 2082
  • [45] Secure Two-Party Computation Based on Blind Quantum Computation
    Yaqing Zhu
    Qin Li
    Chengdong Liu
    Zhiwei Sun
    Yu Peng
    Dongsu Shen
    International Journal of Theoretical Physics, 2020, 59 : 2074 - 2082
  • [46] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [47] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [48] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
  • [49] A study of secure two-party circle computation problem
    Liu, Wen
    Luo, Shou-Shan
    Yang, Yi-Xian
    Xin, Yang
    Xiao, Qian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35
  • [50] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552