A proof of security of yao's protocol for two-party computation

Research output: Contribution to journalArticlepeer-review

474 Scopus citations

Abstract

In the mid 1980s, Yao presented a constant-round protocol for securely computing any two-party functionality in the presence of semi-honest adversaries (FOCS 1986). In this paper, we provide a complete description of Yao's protocol, along with a rigorous proof of security. Despite the importance of Yao's protocol to the theory of cryptography and in particular to the field of secure computation, to the best of our knowledge, this is the first time that an explicit proof of security has been published.

Original languageEnglish
Pages (from-to)161-188
Number of pages28
JournalJournal of Cryptology
Volume22
Issue number2
DOIs
StatePublished - Apr 2009

Funding

FundersFunder number
Seventh Framework Programme208173

    Keywords

    • Proofs of security
    • Secure two-party computation
    • Semi-honest adversaries
    • Yao's two-party protocol

    Fingerprint

    Dive into the research topics of 'A proof of security of yao's protocol for two-party computation'. Together they form a unique fingerprint.

    Cite this