2017
DOI: 10.1007/978-3-662-54970-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently Making Secure Two-Party Computation Fair

Abstract: Abstract. Secure two-party computation cannot be fair against malicious adversaries, unless a trusted third party (TTP) or a gradual-release type super-constant round protocol is employed. Existing optimistic fair two-party computation protocols with constant rounds are either too costly to arbitrate (e.g., the TTP may need to re-do almost the whole computation), or require the use of electronic payments. Furthermore, most of the existing solutions were proven secure and fair via a partial simulation, which, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 58 publications
(133 reference statements)
0
12
0
Order By: Relevance
“…Starting from the early work of [15], optimistic models for fair exchange have been studied in a long sequence of works [11,12,30,33,54,57]. An optimistic model for fair two-party computation using a semi-trusted third party was studied in [20,51].…”
Section: Related Workmentioning
confidence: 99%
“…Starting from the early work of [15], optimistic models for fair exchange have been studied in a long sequence of works [11,12,30,33,54,57]. An optimistic model for fair two-party computation using a semi-trusted third party was studied in [20,51].…”
Section: Related Workmentioning
confidence: 99%
“…Simulation-based Proof with Fairness. One important difference between our proof and those of standard 2PC is that in our case the ideal trusted party must only be contacted by the simulator once it is certain that both parties can obtain the output, as first observed by Kılınç and Küpçü [35] for indistinguishability of the ideal and real world outputs. Therefore, to overcome this difficulty, Alice also commits to Bob's output translation tables as c B i using a trapdoor commitment, and opens them for the opened circuits.…”
Section: Fair Covert 2pcmentioning
confidence: 99%
“…2 (i) Gradual release-based approaches let Alice and Bob reveal each other's output piece by piece, using superconstant rounds [60,36,64,63]. (ii) Arbiter-based approaches achieve constant round complexity by assuming that a trusted third party is available when needed [18,47,35,34]. Optimistic approaches employ the Arbiter only if there is a dispute among the parties [5].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations