On black-box complexity of universally composable security in the CRS model

Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

In this work, we study the intrinsic complexity of blackbox Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings while focusing on achieving security in the common reference string (CRS) model. Our results involve the following: – Static UC Secure Computation. Designing the first static UC secure oblivious transfer protocol based on public-key encryption and stand-alone semi-honest oblivious transfer. As a corollary we obtain the first black-box constructions of UC secure computation assuming only two-round semi-honest oblivious transfer. – One-sided UC Secure Computation. Designing adaptive UC secure two-party computation with single corruptions assuming public-key encryption with oblivious ciphertext generation. – Adaptive UC Secure Computation. Designing adaptively secure UC commitment scheme assuming only public-key encryption with oblivious ciphertext generation. As a corollary we obtain the first black-box constructions of adaptive UC secure computation assuming only (trapdoor) simulatable public-key encryption (as well as a variety of concrete assumptions). We remark that such a result was not known even under non-black-box constructions.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsTetsu Iwata, Jung Hee Cheon
PublisherSpringer Verlag
Pages183-209
Number of pages27
ISBN (Print)9783662487990
DOIs
StatePublished - 2015
Event21st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2015 - Auckland, New Zealand
Duration: 29 Nov 20153 Dec 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9453
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2015
Country/TerritoryNew Zealand
CityAuckland
Period29/11/153/12/15

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2015.

Funding

C. Hazay—Research partially supported by a grant from the Israel Ministry of Science and Technology (grant No. 3-10883). M. Venkitasubramaniam—Research supported by Google Faculty Research Grant and NSF Award CNS-1526377.

FundersFunder number
National Science FoundationCNS-1526377
Google
Ministry of science and technology, Israel3-10883

    Keywords

    • Black-box constructions
    • Oblivious transfer
    • UC commitments
    • UC secure computation

    Fingerprint

    Dive into the research topics of 'On black-box complexity of universally composable security in the CRS model'. Together they form a unique fingerprint.

    Cite this