Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
نویسندگان
چکیده
We consider secure two-party computation in the client-server model. In our scenario, two adversaries operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security in this setting via the local universal composability framework introduced by Canetti and Vald and show that informationtheoretically secure two-party computation is possible if and only if there is always at least one server which remains uncorrupted. Moreover, in our protocols each of the servers only needs to communicate with the two clients, i.e. no messages are exchanged directly between servers. This communication pattern is minimal.
منابع مشابه
Server-Aided Two-Party Computation with Simultaneous Corruption
We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal composability framework introduced by Canetti and Vald and we show that information-theoretically secure two...
متن کاملOutsourcing Multi-Party Computation
We initiate the study of secure multi-party computation (MPC) in a server-aided setting, where the parties have access to a single server that (1) does not have any input to the computation; (2) does not receive any output from the computation; but (3) has a vast (but bounded) amount of computational resources. In this setting, we are concerned with designing protocols that minimize the computa...
متن کاملEfficient Server-Aided 2PC for Mobile Phones
Secure Two-Party Computation (2PC) protocols allow two parties to compute a function of their private inputs without revealing any information besides the output of the computation. There exist low cost general-purpose protocols for semi-honest parties that can be efficiently executed even on smartphones. However, for the case of malicious parties, current 2PC protocols are significantly less e...
متن کاملEfficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation
Computation based on genomic data is becoming increasingly popular today, be it for medical or other purposes. Non-medical uses of genomic data in a computation often take place in a server-mediated setting where the server offers the ability for joint genomic testing between the users. Undeniably, genomic data is highly sensitive, which in contrast to other biometry types, discloses a plethora...
متن کاملOn Server-Aided Computation for RSA Protocols with Private Key Splitting
Server-aided secret computation is a widely investigated topic due to the obvious benefits of such an approach in applications where small constrained terminal equipment is used. Recently, also other ways of using servers to improve the security functionality of end user devices have been proposed. By splitting the private computation functionality between the server and the client, end user de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015