2013
DOI: 10.1007/978-3-642-40041-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation against Adaptive Auxiliary Information

Abstract: Abstract.We study the problem of secure two-party and multiparty computation (MPC) in a setting where a cheating polynomial-time adversary can corrupt an arbitrary subset of parties and, in addition, learn arbitrary auxiliary information on the entire states of all honest parties (including their inputs and random coins), in an adaptive manner, throughout the protocol execution. We formalize a definition of multiparty computation secure against adaptive auxiliary information (AAI-MPC), that intuitively guarant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…We remark that the our ideal model resembles that considered in the recent works on leakage-resilient secure computation protocols [14,5,6]. However, we stress that in our setting, there is no physical leakage in the real world and instead there are just an (unbounded) polynomial number of concurrent sessions.…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…We remark that the our ideal model resembles that considered in the recent works on leakage-resilient secure computation protocols [14,5,6]. However, we stress that in our setting, there is no physical leakage in the real world and instead there are just an (unbounded) polynomial number of concurrent sessions.…”
Section: Introductionmentioning
confidence: 92%
“…However, we stress that in our setting, there is no physical leakage in the real world and instead there are just an (unbounded) polynomial number of concurrent sessions. Indeed, while [14,5,6] use the leaky ideal world approach to bound the security loss in the real world due to leakage attacks, we use the leaky ideal world approach to bound the security loss in the real world due to concurrent attacks. Nevertheless, we find it interesting that there is a parallel between the ideal world guarantees considered in two unrelated settings: leaky real world, and, concurrent real world.…”
Section: Introductionmentioning
confidence: 99%
“…7. To create the transcript, every party puts all values it ever sends or receives onto F Bulletin (except for the private reconstruction of input values) 8 . During the Initialize step of Π, the parties set up the secret-shared MAC key α, generate the parameters g, h of the commitment scheme as well as correlated randomness for the computation.…”
Section: The Online Phasementioning
confidence: 99%
“…Several notions of "strong" semi-honest protocols have been used in recent works -see Remark 1 in [28] or the notion of "semi-malicious" in [8]. In all notions different requirements of security still hold when the adversary can tamper with the randomness of otherwise semi-honest parties.…”
Section: A a Generic Solutionmentioning
confidence: 99%
“…Simulation-based notions of leakage tolerance have been considered also for public-key encryption schemes by Halevi and Lin [29], and in the context of zero-knowledge protocols [27,42,1], coin tossing [10], and secure multi-party computation [9,8,7].…”
Section: Related Workmentioning
confidence: 99%