Skip to main content
Top

2001 | OriginalPaper | Chapter

Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation

Author : Yehuda Lindell

Published in: Advances in Cryptology — CRYPTO 2001

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may arbitrarily deviate from the protocol specification. This is in contrast to Yao’s constant-round protocol that ensures security only in the face of semi-honest adversaries, and to its malicious adversary version that requires a polynomial number of rounds.In order to obtain our result, we present a constant-round protocol for secure coin-tossing of polynomially many coins (in parallel). We then show how this protocol can be used in conjunction with other existing constructions in order to obtain a constant-round protocol for securely computing any two-party functionality. On the subject of coin-tossing, we also present a constant-round perfect coin-tossing protocol, where by “perfect” we mean that the resulting coins are guaranteed to be statistically close to uniform (and not just pseudorandom).

Metadata
Title
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Author
Yehuda Lindell
Copyright Year
2001
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-44647-8_10

Premium Partner