Sciweavers

SCN
2008
Springer

Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

13 years 4 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running system which provides security against malicious adversaries according to rigorous security definition and without using the random oracle model. We ran experiments showing that the protocol is practical. In addition we show that there is little benefit in replacing subcomponents secure in the standard model with those which are only secure in the random oracle model. Throughout we pay particular attention to using the most efficient subcomponents in the protocol, and we select parameters for the encryption schemes, commitments and oblivious transfers which are consistent with a security level equivalent to AES-128.
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
Added 14 Dec 2010
Updated 14 Dec 2010
Type Journal
Year 2008
Where SCN
Authors Yehuda Lindell, Benny Pinkas, Nigel P. Smart
Comments (0)