Fair secure two-party computation - Extended abstract

被引:0
|
作者
Pinkas, B
机构
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We demonstrate a transformation of Yao's protocol for secure two-party computation to a fair protocol in which neither party gains any substantial advantage by terminating the protocol prematurely. The transformation adds additional steps before and after the execution of the original protocol, but does not change it otherwise, and does not use a trusted third party. It is based on the use of gradual release timed commitments, which are a new variant of timed commitments, and on a novel use of blind signatures for verifying that the committed values are correct.
引用
收藏
页码:87 / 105
页数:19
相关论文
共 50 条
  • [1] Efficient Fair Secure Two-Party Computation
    Ruan, Ou
    Zhou, Jing
    Zheng, Minghui
    Cui, Guohua
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
  • [2] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [3] Efficiently Making Secure Two-Party Computation Fair
    Kilinc, Handan
    Kupcu, Alptekin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 188 - 207
  • [4] Fair secure two-party computation protocol based on game theory
    Wang, Jie
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2016, 51 (05): : 902 - 909
  • [5] An efficient fair UC-secure protocol for two-party computation
    Ruan, Ou
    Chen, Jing
    Zhou, Jing
    Cui, Yongquan
    Zhang, Mingwu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1253 - 1263
  • [6] Hidden Δ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
    Bayreuther, Saskia
    Berger, Robin
    Doerre, Felix
    Mechler, Jeremias
    Mueller-Quade, Joern
    INFORMATION SECURITY AND PRIVACY, PT II, ACISP 2024, 2024, 14896 : 330 - 349
  • [7] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [8] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [9] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [10] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429