Round-efficient secure computation in point-to-point networks

23Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

Essentially all work studying the round complexity of secure computation assume broadcast as an atomic primitive, Protocols constructed under this assumption tend to have very poor round complexity when compiled for a point-to-point network due to the high overhead of emulating each invocation of broadcast, This problem is compounded when broadcast is used in more than one round of the original protocol due to the complexity of handling sequential composition (when using round-efficient emulation of broadcast). We argue that if the goal is to optimize round complexity in point-topoint networks, then it is preferable to design protocols -assuming a broadcast channel -minimizing the number of rounds in which broadcast is used rather than minimizing the total number of rounds. With this in mind, we present protocols for secure computation in a number of settings that use only a single round of broadcast. In all cases, we achieve optimal security threshold for adaptive adversaries, and obtain protocols whose round complexity (in a point-to-point network) improves on prior work. © International Association for Cryptology Research 2007.

Cite

CITATION STYLE

APA

Katz, J., & Koo, C. Y. (2007). Round-efficient secure computation in point-to-point networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4515 LNCS, pp. 311–328). Springer Verlag. https://doi.org/10.1007/978-3-540-72540-4_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free