Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, Ostrovsky, Richelson and Scafuro (Crypto 2015) proved optimality of this result by showing how to realize arbitrary functionalities in four rounds where only one party receives the output via a black-box construction (and an extension to five rounds where both parties receive the output). In this paper we study the question of what security is achievable for stand-alone two-party protocols within four rounds. We first provide a four-round two-party protocol for coin-tossing that achieves 1/p-simulation security (i.e. simulation fails with probability at most 1/p+negl), in the presence of malicious corruptions. Next, we provide a four-round two-party protocol for general functionalities, where both parties receive the output, that achieves 1/p-security in the presence of malicious adversaries corrupting one of the parties, and full security in the presence of non-aborting malicious adversaries corrupting the other party. Next, we provide a three-round oblivious-transfer protocol, that achieves 1/p-simulation security against arbitrary malicious senders, while simultaneously guaranteeing a meaningful notion of privacy against malicious corruptions of either party. Finally, we show that the simulation-based security guarantees for our three-round protocols are optimal by proving that 1/p-simulation security is impossible to achieve against both parties in three rounds or less when requiring some minimal guarantees on the privacy of their inputs.
|Title of host publication||Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings|
|Editors||Roberto De Prisco, Vassilis Zikas|
|Number of pages||20|
|State||Published - 2016|
|Event||10th International Conference on Security and Cryptography for Networks, SCN 2016 - Amalfi, Italy|
Duration: 31 Aug 2016 → 2 Sep 2016
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||10th International Conference on Security and Cryptography for Networks, SCN 2016|
|Period||31/08/16 → 2/09/16|
Bibliographical noteFunding Information:
C. Hazay—Research partially supported by a grant from the Israel Ministry of Science and Technology (grant No. 3-10883), by the European Research Council under the ERC consolidators grant agreement n. 615172 (HIPS), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office.
M. Venkitasubramaniam—Research supported by Google Faculty Research Grant and NSF Award CNS-1526377.
© Springer International Publishing Switzerland 2016.
- Oblivious transfer
- Round complexity
- Secure computation