Two-Round Multiparty Secure Computation from Minimal Assumptions

被引:84
作者
Garg, Sanjam [1 ]
Srinivasan, Akshayaram [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II | 2018年 / 10821卷
关键词
OBLIVIOUS TRANSFER; CRYPTOGRAPHY; EFFICIENT;
D O I
10.1007/978-3-319-78375-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide new two-round multiparty secure computation (MPC) protocols assuming the minimal assumption that two-round oblivious transfer (OT) exists. If the assumed two-round OT protocol is secure against semi-honest adversaries (in the plain model) then so is our two-round MPC protocol. Similarly, if the assumed two-round OT protocol is secure against malicious adversaries (in the common random/reference string model) then so is our two-round MPC protocol. Previously, two-round MPC protocols were only known under relatively stronger computational assumptions. Finally, we provide several extensions.
引用
收藏
页码:468 / 499
页数:32
相关论文
共 53 条
[1]  
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[2]  
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[3]  
[Anonymous], 1990, FOCS 1990
[4]   Computationally private randomizing polynomials and their applications [J].
Applebaum, B ;
Ishai, Y ;
Kushilevitz, E .
TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, :260-274
[5]   Cryptography in NC0 [J].
Applebaum, B ;
Ishai, Y ;
Kushilevitz, E .
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, :166-175
[6]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[7]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[8]  
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[9]  
Bellare M., 2012, ACM CCS 2012, P784, DOI [DOI 10.1145/2382196.2382279, 10.1145/2382196.2382279.]
[10]   Adaptive Witness Encryption and Asymmetric Password-Based Cryptography [J].
Bellare, Mihir ;
Viet Tung Hoang .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :308-331