Abstract
In this chapter, we show how to securely compute any deterministic, singleoutput non-reactive functionality in the presence of malicious adversaries. As we have shown in Section 2.5, this suffices for obtaining secure computation of any two-party probabilistic reactive functionality, with almost the same complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Y. Ishai, M. Prabhakaran and A. Sahai. Founding Cryptography on Oblivious Transfer – Efficiently. In CRYPTO’08, Springer-Verlag (LNCS 5157), pages 572–591, 2008.
J. B. Nielsen and C. Orlandi. LEGO for Two-Party Secure Computation. In 6th TCC, Springer-Verlag (LNCS 5444), pages 368–386, 2009.
I. Damgård, T. P. Pedersen and B. Pfitzmann. On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. In CRYPTO’93, Springer-Verlag (LNCS 773), pages 250–265, 1994.
S. Jarecki and V. Shmatikov. Efficient Two-Party Secure Computation on Committed Inputs. In EUROCRYPT’07, Springer-Verlag (LNCS 4515), pages 97–114, 2007.
M. Naor. Bit Commitment Using Pseudorandomness. Journal of Cryptology, 4(2):151–158, 1991.
Y. Lindell and B. Pinkas. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In EUROCRYPT’ 07, Springer-Verlag (LNCS 4515), pages 52–78, 2007.
C. Orlandi. Personal communication, 2010.
R. Cramer, I. Damgård and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In CRYPTO’94, Springer-Verlag (LNCS 839), pages 174–187, 1994.
O. Goldreich. On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits. In 4th TCC, Springer-Verlag (LNCS 4392), pages 174–193, 2007.
S. Halevi and S. Micali. Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing, In CRYPTO’96, Springer- Verlag (LNCS 1109), pages 201–215, 1996.
T. P. Pedersen. Non-interactive and Information-Theoretical Secure Verifiable Secret Sharing. In CRYPTO’91, Springer-Verlag (LNCS 576) pp. 129–140, 1991.
O. Goldreich and A. Kahan. How to Construct Constant-Round Zero- Knowledge Proof Systems for NP. Journal of Cryptology, 9(3):167– 190, 1996.
Y. Lindell and B. Pinkas. Secure Two-Party Computation via Cutand- Choose Oblivious Transfer. Manuscript, 2010.
J. Katz and Y. Lindell. Handling Expected Polynomial-Time Strategies in Simulation-Based Proofs. In Journal of Cryptology, 21(3):303- 349, 2008.
O. Goldreich. Foundations of Cryptography: Volume 1 – Basic Tools. Cambridge University Press, 2001.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hazay, C., Lindell, Y. (2010). Malicious Adversaries. In: Efficient Secure Two-Party Protocols. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14303-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-14303-8_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14302-1
Online ISBN: 978-3-642-14303-8
eBook Packages: Computer ScienceComputer Science (R0)