Skip to main content

2011 | OriginalPaper | Buchkapitel

Efficient Non-interactive Secure Computation

verfasst von : Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai

Erschienen in: Advances in Cryptology – EUROCRYPT 2011

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Suppose that a receiver

R

wishes to publish an encryption of her secret input

x

so that every sender

S

, holding an input

y

, can reveal

f

(

x

,

y

) to

R

by sending her a single message. This should be done while simultaneously protecting the secrecy of

y

against a corrupted

R

and preventing a corrupted

S

from having an unfair influence on the output of

R

beyond what is allowed by

f

.

When the parties are semi-honest, practical solutions can be based on Yao’s garbled circuit technique. However, for the general problem when the parties, or even

S

alone, may be malicious, all known polynomial-time solutions are highly inefficient. This is due in part to the fact that known solutions make a

non-black-box

use of cryptographic primitives, e.g., for providing non-interactive zero-knowledge proofs of statements involving cryptographic computations on secrets.

Motivated by the above question, we consider the problem of secure two-party computation in a model that allows only parallel calls to an ideal oblivious transfer (OT) oracle with no additional interaction. We obtain the following results.

Feasibility.

We present the first general protocols in this model which only make a

black-box

use of a pseudorandom generator (PRG). All previous OT-based protocols either make a non-black-box use of cryptographic primitives or require multiple rounds of interaction.

Efficiency.

We also consider the question of minimizing the asymptotic number of PRG calls made by such protocols. We show that

polylog

(

κ

) calls are sufficient for each gate in a (large) boolean circuit computing

f

, where

κ

is a statistical security parameter guaranteeing at most 2

− 

κ

simulation error of a malicious sender. Furthermore, the number of PRG calls per gate can be made

constant

by settling for a relaxed notion of security which allows a malicious

S

to arbitrarily correlate the event that

R

detects cheating with the input of

R

. This improves over the state of the art also for

interactive

constant-round black-box protocols, which required Ω(

κ

) PRG calls per gate, even with similar relaxations of the notion of security.

Combining the above results with 2-message (parallel) OT protocols in the CRS model, we get the first solutions to the initial motivating question which only make a black-box use of standard cryptographic primitives.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Metadaten
Titel
Efficient Non-interactive Secure Computation
verfasst von
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
Copyright-Jahr
2011
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-20465-4_23