On Black-Box Complexity of Universally Composable Security in the CRS Model

Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings while focusing on achieving security in the common reference string (CRS) model. Our results involve the following:Static UC secure computation. Designing the first static UC oblivious transfer protocol based on public-key encryption and stand-alone semi-honest oblivious transfer. As a corollary, we obtain the first black-box constructions of UC secure computation assuming only two-round semi-honest oblivious transfer.One-sided UC secure computation. Designing adaptive UC two-party computation with single corruptions assuming public-key encryption with oblivious ciphertext generation.Adaptive UC secure computation. Designing adaptively secure UC commitment scheme assuming only public-key encryption with oblivious ciphertext generation. As a corollary, we obtain the first black-box constructions of adaptive UC secure computation assuming only (trapdoor) simulatable public-key encryption (as well as a variety of concrete assumptions).We remark that such a result was not known even under non-black-box constructions.

Original languageEnglish
Pages (from-to)635-689
Number of pages55
JournalJournal of Cryptology
Volume32
Issue number3
DOIs
StatePublished - 15 Jul 2019

Bibliographical note

Publisher Copyright:
© 2019, International Association for Cryptologic Research.

Keywords

  • Black-box constructions
  • Oblivious transfer
  • UC commitments
  • UC secure computation

Fingerprint

Dive into the research topics of 'On Black-Box Complexity of Universally Composable Security in the CRS Model'. Together they form a unique fingerprint.

Cite this