Two-output secure computation with malicious adversaries

87Citations
Citations of this article
71Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a method to compile Yao's two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our approach can enjoy lower communication and computation overhead than methods based on cut-and-choose [13] and lower overhead than methods based on zero-knowledge proofs [8] (or ∑-protocols [14]). To do so, we develop and analyze new solutions to issues arising with this transformation: - How to guarantee the generator's input consistency - How to support different outputs for each player without adding extra gates to the circuit of the function f being computed - How the evaluator can retrieve input keys but avoid selective failure attacks - Challenging 3/5 of the circuits is near optimal for cut-and-choose (and better than challenging 1/2) Our protocols require the existence of secure-OT and claw-free functions that have a weak malleability property. We discuss an experimental implementation of our protocol to validate our efficiency claims. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Shelat, A., & Shen, C. H. (2011). Two-output secure computation with malicious adversaries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6632 LNCS, pp. 386–405). https://doi.org/10.1007/978-3-642-20465-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free