Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Author(s)
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana
DownloadAccepted version (391.8Kb)
Terms of use
Metadata
Show full item recordAbstract
© International Association for Cryptologic Research 2015. We present the first two-round, two-party general function evaluation protocol that is secure against honest-but-curious adaptive corruption of both parties. In addition, the protocol is incoercible for one of the parties, and fully leakage tolerant. It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. A Byzantine version of the protocol, obtained by applying the Canetti et al. [STOC 02] compiler, achieves UC security with comparable efficiency parameters, but is no longer incoercible.1.
Date issued
2015Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer SciencePublisher
Springer Nature America, Inc
ISBN
9783662464960
9783662464977
ISSN
0302-9743
1611-3349