2006 | OriginalPaper | Buchkapitel
Efficiency Tradeoffs for Malicious Two-Party Computation
verfasst von : Payman Mohassel, Matthew Franklin
Erschienen in: Public Key Cryptography - PKC 2006
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
We study efficiency tradeoffs for secure two-party computation in presence of malicious behavior. We investigate two main approaches for defending against malicious behavior in
Yao’s garbled circuit
method: (1)
Committed-input
scheme, (2)
Equality-checker
scheme. We provide asymptotic and concrete analysis of communication and computation costs of the designed protocols. We also develop a weaker definition of security (
k-leaked model
) for malicious two-party computation that allows for disclosure of some information to a malicious party. We design more efficient variations of
Yao’s
protocol that are secure in the proposed model.