2022
DOI: 10.1155/2022/3880413
|View full text |Cite|
|
Sign up to set email alerts
|

Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer

Abstract: In secure two-party computation, each party has its input and wants to jointly compute a function from which it obtains the output corresponding to its respective inputs. For achieving security against a malicious adversary, an effective approach is using cut-and-choose, which requires the circuit constructor P1 to construct S copies of the circuit C (C is used to compute the function F). The circuit evaluator P2 selects S∕2 circuits to open for the check. If these S∕2 circuits are correctly constructed, P2 as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…The following comparison with classical studies based on Cut-and-Choose techniques 12,18,20 is done for communication cost, symmetric and asymmetric computational cost, and quantum resistance. The detailed differences between the three protocols are shown in Table 5.…”
Section: The Count Of Communication Bandwidth Is As Followsmentioning
confidence: 99%
See 3 more Smart Citations
“…The following comparison with classical studies based on Cut-and-Choose techniques 12,18,20 is done for communication cost, symmetric and asymmetric computational cost, and quantum resistance. The detailed differences between the three protocols are shown in Table 5.…”
Section: The Count Of Communication Bandwidth Is As Followsmentioning
confidence: 99%
“…The protocol security of literature 12,18,20 relies on the DDH assumption, which is not theoretically resistant to quantum attacks, and the communication cost is determined by all the garbled circuit ciphertexts and cluster elements. With 220 bits per group element and 128 bits per ciphertext size, the communication bandwidth of literature 12 is roughly 449,640,000 bits (about 53.60 MB of data), while the communication bandwidth of literature 18 is estimated to be about 177,725,440 bits (about 21.19 MB of data) using the same parameters.…”
Section: The Count Of Communication Bandwidth Is As Followsmentioning
confidence: 99%
See 2 more Smart Citations
“…Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process.…”
mentioning
confidence: 99%