One-sided adaptively secure two-party computation

Carmit Hazay, Arpita Patra

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where "hackers" actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in designing adaptively secure protocols is a non-committing encryption (NCE) that implements secure communication channels in the presence of adaptive corruptions. Current constructions require a number of public key operations that grows linearly with the length of the message. Furthermore, general two-party protocols require a number of NCE calls that is linear in the circuit size. In this paper we study the two-party setting in which at most one of the parties is adaptively corrupted, which we believe is the right security notion in the two-party setting. We study the feasibility of (1) NCE with constant number of public key operations for large message spaces (2) Oblivious transfer with constant number of public key operations for large input spaces of the sender, and (3) constant round secure computation protocols with a number of NCE calls, and an overall number of public key operations, that are independent of the circuit size. Our study demonstrates that such primitives indeed exist in the presence of single corruptions, while this is not known for fully adaptive security.

Original languageEnglish
Title of host publicationTheory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings
PublisherSpringer Verlag
Pages368-393
Number of pages26
ISBN (Print)9783642542411
DOIs
StatePublished - 2014
Event11th Theory of Cryptography Conference on Theory of Cryptography, TCC 2014 - San Diego, CA, United States
Duration: 24 Feb 201426 Feb 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8349 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th Theory of Cryptography Conference on Theory of Cryptography, TCC 2014
Country/TerritoryUnited States
CitySan Diego, CA
Period24/02/1426/02/14

Funding

FundersFunder number
Engineering and Physical Sciences Research CouncilEP/I03126X/1

    Keywords

    • Adaptively Secure Computation
    • Non-Committing Encryption
    • Oblivious Transfer

    Fingerprint

    Dive into the research topics of 'One-sided adaptively secure two-party computation'. Together they form a unique fingerprint.

    Cite this