What Security can we Achieve in 4-Rounds?

نویسندگان

  • Carmit Hazay
  • Muthuramakrishnan Venkitasubramaniam
چکیده

In this paper we study the question of what security is achievable for stand-alone two-party computation in four-rounds. Our starting point point is the Katz-Ostrovsky lower bound [KO04] which determines that the exact round complexity of achieving a secure two-party computation protocol is five. To get around this lower bound we consider two relaxations of the standard simulation-based security definition, where each relaxation implies a different security guarantee. Specifically, we analyze our protocols in the presence of malicious non-aborting adversaries (for which we obtain full security) and malicious aborting adversaries (for which we obtain 1/p-security, which implies that the simulation fails with probability at most 1/p + negl). We further prove that our security guarantee is tight with respect to the party that obtains the input first.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

What Security Can We Achieve In Less Than 4-Rounds?

Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, Ostrovsky, Richelson and Scafuro (Crypto 2015) proved optimality of this result by showing how to realize arbitrary functionalities in four rounds where...

متن کامل

What Security Can We Achieve Within 4 Rounds?

Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, Ostrovsky, Richelson and Scafuro (Crypto 2015) proved optimality of this result by showing how to realize arbitrary functionalities in four rounds where...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

Luby-Rackoff: 7 Rounds are Enough for 2 Security

In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all adaptative chosen plaintext attacks when the number of queries is m ¿ 2. Moreover, 4-round random Feistel schemes are also secure against all adaptative chosen plaintext and chosen ciphertext attacks when m ¿ 2. It was shown later that these bounds are tight for 3 and 4 rounds (see [9] or [1]). ...

متن کامل

Cultural and Social Enigmas: Missing Pieces of Food Security

   The growing attention in food security has suggested many approaches to develop a society free from hunger and malnutrition. Methodological approaches are mostly used to overcome the challenges of food security, but food insecurity is more than mere availability and access to food. Cultural and social dimensions and their intricacies to achieve food security are mostly missing from the lite...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015