Advertisement

Efficiency Tradeoffs for Malicious Two-Party Computation

  • Payman Mohassel
  • Matthew Franklin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3958)

Abstract

We study efficiency tradeoffs for secure two-party computation in presence of malicious behavior. We investigate two main approaches for defending against malicious behavior in Yao’s garbled circuit method: (1) Committed-input scheme, (2) Equality-checker scheme. We provide asymptotic and concrete analysis of communication and computation costs of the designed protocols. We also develop a weaker definition of security (k-leaked model) for malicious two-party computation that allows for disclosure of some information to a malicious party. We design more efficient variations of Yao’s protocol that are secure in the proposed model.

Keywords

secure two-party computation secure function evaluation Yao’s garbled circuit malicious adversary 

References

  1. [AFK87]
    Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In: STOC 1987: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 195–203. ACM Press, New York (1987)CrossRefGoogle Scholar
  2. [AIR01]
    Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, p. 119. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. [BYCKO93]
    Bar-Yehuda, R., Chor, B., Kushilevitz, E., Orlitsky, A.: Privacy, additional information, and communication. IEEE Transactions on Information Theory (1993)Google Scholar
  4. [Cle89]
    Cleve, R.: Controlled gradual disclosure schemes for random bits and their applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 573–588. Springer, Heidelberg (1990)Google Scholar
  5. [FNW96]
    Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun. ACM 39(5), 77–85 (1996)CrossRefGoogle Scholar
  6. [GMR89]
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRefzbMATHGoogle Scholar
  7. [GMW86]
    Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in np have zero-knowledge proofs. In: Proceedings of the 27th FOCS, pp. 174–187 (1986)Google Scholar
  8. [GMW87]
    Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proceedings of 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (1987)Google Scholar
  9. [Gol04]
    Goldreich, O.: Foundations of cryptography - vol.2, ch. 7 (2004)Google Scholar
  10. [GP99]
    Goldreich, O., Petrank, E.: Quantifying knowledge complexity. Computational Complexity 8, 50–98 (1999)MathSciNetCrossRefzbMATHGoogle Scholar
  11. [lMR83]
    luby, M., Micali, S., Rackoff., C.: How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin. In: FOCS (1983)Google Scholar
  12. [LP04]
    Lindell, Y., Pinkas, B.: A proof of yao’s protocol for secure two-party computation. eprint archive (2004)Google Scholar
  13. [MNPS04]
    Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay– a secure twoparty computation system. In: Proceedings of Usenix security (2004)Google Scholar
  14. [Ped91]
    Pederson, T.P.: Non-interactive and information-theoritic secure verifiable secret-sharing (1991)Google Scholar
  15. [Pin03]
    Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87–105. Springer, Heidelberg (2003)Google Scholar
  16. [Rab81]
    Rabin, M.: How to exchange secrets by oblivious transfer. Technical Report Tech., Memo. TR-81, Aiken Computation Labratory, Harvard University (1981)Google Scholar
  17. [Woo06]
    Woodruff, D.: unpublished manuscript (2006)Google Scholar
  18. [Yao86]
    Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE symposioum on Foundations of Computer science, pp. 162–167 (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Payman Mohassel
    • 1
  • Matthew Franklin
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA

Personalised recommendations