Advertisement

One-Time Tables for Two-Party Computation

  • Donald Beaver
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1449)

Abstract

In two-party secure computation, a pair of mutually- distrusting and potentially malicious parties attempt to evaluate a function f(x, y) of private inputs x and y, held respectively by each, with-out revealing anything but f(x, y) and without involving a trusted third party. This goal has been achieved with varying degrees of generality and efficiency using a variety of primitives, including combined oblivious transfer (OT) [GMW87], abstract oblivious transfer [K88], and committed oblivious transfer [CTG95].

This work introduces the concept of a two-party one-time table (OTT), a novel primitive that is theoretically equivalent to precomputed OT. The OTT is tailored to support field computations rather than single-bit logical operations, thereby streamlining higher-level computations, particularly where information-theoretic security is demanded.

The two-party one-time table is also motivated by the ease with which it can be constructed using simple resources provided by one or more partly-trusted external servers. This commodity-based approach strengthens overall security by ensuring that information flows strictly from servers to Alice and Bob, removing the need to trust third parties with the sensitive data itself

Keywords

Oblivious Transfer Multiplication Gate Input Wire Private Input Multiparty Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BB88]
    J. Bar-Ilan, D. Beaver. “Non-Cryptographic Fault-Tolerant Computing in a Constant Expected Number of Rounds of Interaction.” Proceedings of PODC, ACM, 1989, 201–209.Google Scholar
  2. [B91]
    D. Beaver. “Efficient Multiparty Protocols Using Circuit Randomization.” Advances in Cryptology — Crypto’ 91 Proceedings, Springer-Verlag LNCS 576, 1992, 420–432.Google Scholar
  3. [B95]
    D. Beaver. “Precomputing Oblivious Transfer.” Advances in Cryptology — Crypto’ 95 Proceedings, Springer-Verlag LNCS 963, 1995, 97–109.Google Scholar
  4. [B97]
    D. Beaver. “Commodity-Based Cryptography.” Proceedings of the 29th STOC, ACM, 1997, 446–455.Google Scholar
  5. [Cle86]
    R. Cleve. “Limits on the Security of Coin Flips when Half the Processors are Faulty.” Proceedings of the 18th STOC, ACM, 1986, 364–370.Google Scholar
  6. [CDG87]
    D. Chaum, I. Damgrd, J. van de Graaf. “Multiparty Computations Ensuring Secrecy of Each Party’s Input and Correctness of the Output.” Advances in Cryptology — Crypto’ 87 Proceedings, Springer-Verlag LNCS 293, 1988.Google Scholar
  7. [CTG95]
    C. Crépeau, A. Tapp, J. van de Graaf. “Committed Oblivious Transfer and Private Multi-Party Computations.” Advances in Cryptology — Crypto’ 95 Proceedings, Springer-Verlag LNCS 963, 1995, 110–123.Google Scholar
  8. [GMW87]
    O. Goldreich, S. Micali, A. Wigderson. “How to Play Any Mental Game, or A Completeness Theorem for Protocols with Honest Majority.” Proceedings of the 19th STOC, ACM, 1987, 218–229.Google Scholar
  9. [K88]
    J. Kilian. “Founding Cryptography on Oblivious Transfer.” Proceedings of the 20th STOC, ACM, 1988, 20–29.Google Scholar
  10. [ML85]
    A. Michelson, A. Levesque. Error-Control Techniques for Digital Communication. John Wiley and Sons, New York: 1985.Google Scholar
  11. [Rab81]
    M.O. Rabin. “How to Exchange Secrets by Oblivious Transfer.” TR-81, Harvard, 1981.Google Scholar
  12. [RB89]
    T. Rabin, M. Ben-Or. “Verifiable Secret Sharing and Multiparty Protocols with Honest Majority.” Proceedings of the 21st STOC, ACM, 1989, 73–85.Google Scholar
  13. [Sha79]
    A. Shamir. “How to Share a Secret.” Communications of the ACM, 22, 1979, 612–613.zbMATHCrossRefMathSciNetGoogle Scholar
  14. [TW86]
    M. Tompa, H. Woll. “How to Share a Secret with Cheaters.” Advances in Cryptology — Crypto’ 86 Proceedings, Springer-Verlag LNCS 263, 1987, 261–265.Google Scholar
  15. [Yao82a]
    A. Yao. “Protocols for Secure Computations.” Proceedings of the 23rd FOCS, IEEE, 1982, 160–164.Google Scholar
  16. [Yao82b]
    A. Yao. “Theory and Applications of Trapdoor Functions.” Proceedings of the 23rd FOCS, IEEE, 1982, 80–91Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Donald Beaver
    • 1
  1. 1.IBM/TransarcUSA

Personalised recommendations