2013
DOI: 10.1007/978-3-642-42045-0_23
|View full text |Cite
|
Sign up to set email alerts
|

Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique

Abstract: Abstract. A secure two-party computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if intermediated by a trusted third party. In the malicious model, this can be achieved with a cut-and-choose of garbled circuits (C&C-GCs), where some GCs are verified for correctness and the remaining are evaluated to determine the circuit output. This paper presents a new C&C-GCs-based S2PC protocol, with significant advantages in efficiency and applicability. First, in contrast with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…Previous reusable garbled-circuit schemes include that of Brandão [5], which uses homomorphic encryption, Gentry et al [10], which uses attribute-based functional encryption, and Goldwasser et al [13], which introduces a succinct functional encryption scheme. These previous works are purely theoretical; none of them provides experimental performance analysis.…”
Section: Commit Cut-and-choose Vs Ot Cut-and-choosementioning
confidence: 99%
See 1 more Smart Citation
“…Previous reusable garbled-circuit schemes include that of Brandão [5], which uses homomorphic encryption, Gentry et al [10], which uses attribute-based functional encryption, and Goldwasser et al [13], which introduces a succinct functional encryption scheme. These previous works are purely theoretical; none of them provides experimental performance analysis.…”
Section: Commit Cut-and-choose Vs Ot Cut-and-choosementioning
confidence: 99%
“…Through the use of improved input validation mechanisms proposed by shelat and Shen [38] (hereon sS13) and new methods of partial input gate checks and evaluation, we improve on previous proposals. There are other approaches to the creation of reusable garbled circuits [13,10,5], and previous work on reusing encrypted values in the ORAM model [30,11,31], but these earlier schemes have not been implemented. By contrast, we have implemented our scheme and found it to be both practical and efficient; we provide a performance analysis and a sample application to illustrate its feasibility (Section 6), as well as a simplified example execution (Appendix C).…”
Section: Introductionmentioning
confidence: 98%
“…The needed commitments can be obtained by a specialized S2PC protocol that directly provides commitments of the inputs and outputs of both parties (e.g., [6]). However, in the interest of generality, below we also propose an alternative applicable to any generic S2PC protocol of Boolean circuits.…”
Section: Initial Intuitionmentioning
confidence: 99%
“…Over the last decade several solutions to the above issues have been proposed, along with dramatic efficiency improvements for secure 2PC protocols based on the cut-and-choose approach of garbled circuits [4], [18], [32], [36], [39], [40], [42], [48], [50], [51], [53], [58], [64], [66], [67], [69]. Finally we note for completeness that secure computation has also been studied in great detail for many other settings, including the more general multi-party case (MPC).…”
Section: Introductionmentioning
confidence: 99%