Sciweavers

JOC
2016

Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries

8 years 13 days ago
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries
In the setting of secure two-party computation, two parties wish to securely compute a joint function of their private inputs, while revealing only the output. One of the primary techniques for achieving efficient secure two-party computation is that of Yao’s garbled circuits (FOCS 1986). In the semi-honest model, where just one garbled circuit is constructed and evaluated, Yao’s protocol has proven itself to be very efficient. However, a malicious adversary who constructs the garbled circuit may construct a garbling of a different circuit computing a different function, and this cannot be detected (due to the garbling). In order to solve this problem, many circuits are sent and some of them are opened to check that they are correct while the others are evaluated. This methodology, called cut-and-choose, introduces significant overhead, both in computation and in communication, and is mainly due to the number of circuits that must be used in order to prevent cheating. In this p...
Yehuda Lindell
Added 07 Apr 2016
Updated 07 Apr 2016
Type Journal
Year 2016
Where JOC
Authors Yehuda Lindell
Comments (0)