2011
DOI: 10.1007/978-3-642-19571-6_22
|View full text |Cite
|
Sign up to set email alerts
|

Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions

Abstract: Abstract. In this paper we present simple but comprehensive combinatorial criteria for completeness of finite deterministic 2-party functions with respect to information-theoretic security. We give a general protocol construction for efficient and statistically secure reduction of oblivious transfer to any finite deterministic 2-party function that fulfills our criteria. For the resulting protocols we prove universal composability. Our results are tight in the sense that our criteria still are necessary for an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 27 publications
1
13
0
Order By: Relevance
“…Using the normal form described above, we show that, unless a functionality is passive-complete, it is isomorphic to one with symmetric output. This generalizes an analogous result of [9] for non-reactive functionalities.…”
Section: Passive-trivial; and 2 F Is Passive-complete If And Only Ifsupporting
confidence: 86%
See 1 more Smart Citation
“…Using the normal form described above, we show that, unless a functionality is passive-complete, it is isomorphic to one with symmetric output. This generalizes an analogous result of [9] for non-reactive functionalities.…”
Section: Passive-trivial; and 2 F Is Passive-complete If And Only Ifsupporting
confidence: 86%
“…Kilian [6] was the first to characterize completeness for 2-party SFE functionalities. The result was later generalized to functionalities with possibly different outputs to the two parties [9]. As before, we strongly leverage the well-known characterization for the SFE case in our own result for the reactive case.…”
Section: Introductionmentioning
confidence: 76%
“…Kilian vastly generalized this by giving several completeness characterizations: active-complete deterministic asymmetric functions, passive-complete symmetric functions and passive-complete asymmetric functions [Kil00]. Kilian's result for active-completeness was extended in two different directions by subsequent work: Crépeau, Morozov and Wolf [CMW04] considered "channel functions" which are randomized asymmetric functions (only one party has output), but with the additional restriction that only one party has input; Kraschewski and Müller-Quade [KM11] considered functions in which both parties can have inputs and outputs, but restricted to deterministic functions.…”
Section: Connections To Circuitmentioning
confidence: 99%
“…(Converting the erasure channel to F OT requires interaction.) The way [KM11] handles active corruption using cut-and-choose checks is highly interactive and again inadequate for our purposes.…”
Section: Our Techniquesmentioning
confidence: 99%
“…This rather enigmatic protocol does invoke F with fixed roles, but is not useful for showing impossibility of concurrent secure protocol for F, because it is modestly interactive (two steps which should occur one after the other) and more importantly, because it yields only an erasure channel and not a 2 1 -OT. 10 The only known substitute for this protocol, by [KM11], is much more interactive, involving several rounds of communication in both directions, apart from the invocation of F. Our challenge is to devise an asynchronous non-interactive protocol which uses F with fixed-roles and directly yields 2 1 -OT. Being non-interactive and asynchronous requires that all the sessions are invoked together by an honest party, but the adversary is allowed to schedule them adaptively, and base its inputs for later sessions based on the outputs from earlier sessions (rushing adversary).…”
Section: Output Idealmentioning
confidence: 99%