A New Approach to Practical Active-Secure Two-Party Computation

  • Jesper Buus Nielsen
  • Peter Sebastian Nordholt
  • Claudio Orlandi
  • Sai Sheshank Burra
Conference paper

DOI: 10.1007/978-3-642-32009-5_40

Volume 7417 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Nielsen J.B., Nordholt P.S., Orlandi C., Burra S.S. (2012) A New Approach to Practical Active-Secure Two-Party Computation. In: Safavi-Naini R., Canetti R. (eds) Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science, vol 7417. Springer, Berlin, Heidelberg

Abstract

We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao’s garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce a number of novel techniques for relating the outputs and inputs of OTs in a larger construction.

We also report on an implementation of this approach, that shows that our protocol is more efficient than any previous one: For big enough circuits, we can evaluate more than 20000 Boolean gates per second. As an example, evaluating one oblivious AES encryption (\(\sim 34000\) gates) takes 64 seconds, but when repeating the task 27 times it only takes less than 3 seconds per instance.

Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2012 2012

Authors and Affiliations

  • Jesper Buus Nielsen
    • 1
  • Peter Sebastian Nordholt
    • 1
  • Claudio Orlandi
    • 2
  • Sai Sheshank Burra
    • 3
  1. 1.Aarhus UniversityAarhusDenmark
  2. 2.Bar-Ilan UniversityRamat GanIsrael
  3. 3.Indian Institute of Technology GuwahatiGuwahatiIndia