Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

被引:40
作者
Badrinarayanan, Saikrishna [1 ]
Garg, Sanjam [2 ]
Ishai, Yuval [1 ,3 ]
Sahai, Amit [1 ]
Wadia, Akshay [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90032 USA
[2] Univ Calif Berkeley, Berkeley, CA USA
[3] Technion, Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III | 2017年 / 10626卷
关键词
NONINTERACTIVE ZERO-KNOWLEDGE; OBLIVIOUS TRANSFER; LOWER BOUNDS;
D O I
10.1007/978-3-319-70700-6_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study the feasibility of two-message protocols for secure two-party computation in the plain model, for functionalities that deliver output to one party, with security against malicious parties. Since known impossibility results rule out polynomial-time simulation in this setting, we consider the common relaxation of allowing super-polynomial simulation. We first address the case of zero-knowledge functionalities. We present a new construction of two-message zero-knowledge protocols with super-polynomial simulation from any (sub-exponentially hard) game-based two-message oblivious transfer protocol, which we call Weak OT. As a corollary, we get the first two-message WI arguments for NP from (sub-exponential) DDH. Prior to our work, such protocols could only be constructed from assumptions that are known to imply non-interactive zero-knowledge protocols (NIZK), which do not include DDH. We then extend the above result to the case of general single-output functionalities, showing how to construct two-message secure computation protocols with quasi-polynomial simulation from Weak OT. This implies protocols based on sub-exponential variants of several standard assumptions, including Decisional Diffie Hellman (DDH), Quadratic Residuosity Assumption, and N th Residuosity Assumption. Prior works on two-message protocols either relied on some trusted setup (such as a common reference string) or were restricted to special functionalities such as blind signatures. As a corollary, we get three-message protocols for two-output functionalities, which include coin-tossing as an interesting special case. For both types of functionalities, the number of messages (two or three) is optimal. Finally, motivated by the above, we further study the Weak OT primitive. On the positive side, we show that Weak OT can be based on any semi-honest 2-message OT with a short second message. This simplifies a previous construction of Weak OT from the N th Residuosity Assumption. We also present a construction of Weak OT from Witness Encryption (WE) and injective one-way functions, implying the first construction of two-message WI arguments from WE. On the negative side, we show that previous constructions of Weak OT do not satisfy simulation-based security even if the simulator can be computationally unbounded.
引用
收藏
页码:275 / 303
页数:29
相关论文
共 41 条
[1]  
Afshar A, 2014, LECT NOTES COMPUT SC, V8441, P387, DOI 10.1007/978-3-642-55220-5_22
[2]  
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[3]  
[Anonymous], 1988, STOC
[4]  
[Anonymous], 2013, STOC
[5]  
[Anonymous], 2003, LNCS, P255, DOI DOI 10.1007/3-540-39200-916
[6]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[7]  
Badrinarayanan Saikrishna., 2017, TCC
[8]  
Barak B, 2005, ANN IEEE SYMP FOUND, P543
[9]   Lower bounds for non-black-box zero knowledge [J].
Barak, B ;
Lindell, Y ;
Vadhan, S .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :384-393
[10]  
Barak B, 2006, ANN IEEE SYMP FOUND, P345