TY - JOUR
T1 - Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
AU - Hazay, Carmit
AU - Yanai, Avishay
N1 - Publisher Copyright:
© 2019, International Association for Cryptologic Research.
PY - 2019/10/1
Y1 - 2019/10/1
N2 - The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that mostly follows the approach for which the desired functionality must be represented as a Boolean circuit. In this work, we design the first constant-round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al. (EUROCRYPT, pp 405–422, 2014) that readily induces a constant round semi-honest two-party protocol for any RAM program assuming identity-based encryption schemes. We show how to enhance the security of their construction into the malicious setting while facing several challenges that stem due to handling the data memory. Next, we show how to apply our techniques to a more recent garbled RAM construction by Garg et al. (STOC, pp 449–458, 2015) that is based on one-way functions.
AB - The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that mostly follows the approach for which the desired functionality must be represented as a Boolean circuit. In this work, we design the first constant-round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al. (EUROCRYPT, pp 405–422, 2014) that readily induces a constant round semi-honest two-party protocol for any RAM program assuming identity-based encryption schemes. We show how to enhance the security of their construction into the malicious setting while facing several challenges that stem due to handling the data memory. Next, we show how to apply our techniques to a more recent garbled RAM construction by Garg et al. (STOC, pp 449–458, 2015) that is based on one-way functions.
KW - 2PC
KW - Constant-Round
KW - Garbled RAM
KW - ORAM
UR - http://www.scopus.com/inward/record.url?scp=85064828594&partnerID=8YFLogxK
U2 - 10.1007/s00145-019-09321-3
DO - 10.1007/s00145-019-09321-3
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85064828594
SN - 0933-2790
VL - 32
SP - 1144
EP - 1199
JO - Journal of Cryptology
JF - Journal of Cryptology
IS - 4
ER -