Implementing two-party computation efficiently with security against malicious adversaries

Yehuda Lindell, Benny Pinkas, Nigel P. Smart

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

88 Scopus citations

Abstract

We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running system which provides security against malicious adversaries according to rigorous security definition and without using the random oracle model. We ran experiments showing that the protocol is practical. In addition we show that there is little benefit in replacing subcomponents secure in the standard model with those which are only secure in the random oracle model. Throughout we pay particular attention to using the most efficient subcomponents in the protocol, and we select parameters for the encryption schemes, commitments and oblivious transfers which are consistent with a security level equivalent to AES-128.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings
Pages2-20
Number of pages19
DOIs
StatePublished - 2008
Event6th International Conference on Security and Cryptography for Networks, SCN 2008 - Amalfi, Italy
Duration: 10 Sep 200812 Sep 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5229 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Security and Cryptography for Networks, SCN 2008
Country/TerritoryItaly
CityAmalfi
Period10/09/0812/09/08

Bibliographical note

Funding Information:
The first author was supported by The Israel Science Foundation (grant No. 781/07) and by an Infrastructures grant from the Israeli Ministry of Science. The other authors were supported by the European Union under the FP7-STREP project CACE. The second author was also supported by The Israel Science Foundation (grant No. 860/06).

Funding

The first author was supported by The Israel Science Foundation (grant No. 781/07) and by an Infrastructures grant from the Israeli Ministry of Science. The other authors were supported by the European Union under the FP7-STREP project CACE. The second author was also supported by The Israel Science Foundation (grant No. 860/06).

FundersFunder number
Israeli Ministry of Science
Seventh Framework Programme216499
European CommissionFP7-STREP, 860/06
Israel Science Foundation781/07

    Fingerprint

    Dive into the research topics of 'Implementing two-party computation efficiently with security against malicious adversaries'. Together they form a unique fingerprint.

    Cite this