Efficient Two Party and Multi Party Computation Against Covert Adversaries
نویسندگان
چکیده
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure computation protocols which are efficient enough to be usable in practice. Aumann and Lindell presented an efficient two party computation protocol secure against covert adversaries. They were able to utilize cut and choose techniques rather than relying on expensive zero knowledge proofs. In this paper, we design an efficient multi-party computation protocol in the covert adversary model which remains secure even if a majority of the parties are dishonest. We also substantially improve the two-party protocol of Aumann and Lindell. Our protocols avoid general NP-reductions and only make a black box use of efficiently implementable cryptographic primitives. Our two-party protocol is constant-round while the multi-party one requires a logarithmic (in number of parties) number of rounds of interaction between the parties. Our protocols are secure as per the standard simulation-based definitions of security. Although our main focus is on designing efficient protocols in the covert adversary model, the techniques used in our two party case directly generalize to improve the efficiency of two party computation protocols secure against standard malicious adversaries.
منابع مشابه
Solving the Dating Problem with the SENPAI Protocol
The SENPAI protocol (Secure ENcrypted Protocol for Affection Information protocol) builds on work by [1] to allow efficient secure two-party computation on a problem of general interest with security against covert adversaries, while avoiding the overhead of zero-knowledge proofs. We will discuss historical attempts to solve the problem under discussion, followed by an explanation of the SENPAI...
متن کاملSecure Two-Party Computation over a Z-Channel
In secure two-party computation, two mutually distrusting parties are interested in jointly computing a function, while preserving the privacy of their respective inputs. However, when communicating over a clear channel, security against computationally unbounded adversaries is impossible. Thus is the importance of noisy channels, over which we can build Oblivious Transfer (OT), a fundamental p...
متن کاملEfficient Covert Two-Party Computation
Covert computation (of general functions) strengthens the notion of secure computation so that the computation hides not only everything about the participants’ inputs, except for what is revealed by the function output, but it also hides the very fact that the computation is taking place, by ensuring that protocol participants are indistinguishable from random beacons, except when the function...
متن کاملEfficient Secure Computation with Garbled Circuits
Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to s...
متن کاملLEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao’s garbled circuits. Unfortunately, Yao’s construction provide security only against passive adversaries. Several constructions (zero-knowledge compiler, cut-and-choose) are known in order to provide security against active adversaries, but most of them are not efficient enough to be considered practical. In...
متن کامل