19,992 Hits in 3.7 sec

Round-Optimal Black-Box Two-Party Computation [chapter]

Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro
2015 Lecture Notes in Computer Science  
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party computation with respect to black-box proofs of security.  ...  Plugging a parallel version of our oblivious transfer into the blackbox non-interactive secure computation protocol of [IKO + 11] we obtain the first round-optimal black-box two-party protocol in the plain  ...  Namely, Can we construct a round-optimal fully black-box protocol for two-party computation based on general assumptions? Black-box round-optimal two-party computation?  ... 
doi:10.1007/978-3-662-48000-7_17 fatcat:txyvfmcx5zdevjdqolxk4ezbba

Separating Two-Round Secure Computation From Oblivious Transfer

Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan, Michael Wagner
2020 Innovations in Theoretical Computer Science  
for the difficulty of ruling out black-box constructions of 3-round MPC from 2-round OT, and separate a relaxed "non-compact" variant of 2-party homomorphic secret sharing from 2-round OT.  ...  These constructions made a novel non-black-box use of the underlying OT protocol. The question remained whether this can be done by only making black-box use of 2-round OT.  ...  It additionally requires the parties to make a black-box use of any pseudorandom generator (PRG). Theorem 1 (Round-optimal 2PC [54] ).  ... 
doi:10.4230/lipics.itcs.2020.71 dblp:conf/innovations/ApplebaumBGIS20 fatcat:2rnasclhbnhqnlhiyytadlvqfq

On the Black-Box Complexity of Optimally-Fair Coin Tossing [chapter]

Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin
2011 Lecture Notes in Computer Science  
Let Π be a black-box construction for two-party optimally-fair coin tossing based on one-way functions with input and output length n.  ...  An important corollary of this is that it is impossible to construct an optimally-fair coin tossing protocol via a black-box construction from one-way functions whose round complexity is independent of  ...  There are actually several flavors of black-box reductions (fully black-box, semi black-box and weakly black-box [rtv04] ).  ... 
doi:10.1007/978-3-642-19571-6_27 fatcat:5cvqyh7vvbgq7prdevu4ny6uf4

Round-Optimal Secure Two-Party Computation [chapter]

Jonathan Katz, Rafail Ostrovsky
2004 Lecture Notes in Computer Science  
Here, we establish the exact round complexity of secure two-party computation with respect to black-box proofs of security.  ...  We consider the central cryptographic task of secure twoparty computation: two parties wish to compute some function of their private inputs (each receiving possibly different outputs) where security should  ...  Lower bounds on the round-complexity of secure two-party computation with respect to black-box 1 proofs of security have also been given. ( We comment further on black-box bounds in Section 1.2.)  ... 
doi:10.1007/978-3-540-28628-8_21 fatcat:cp57afc7ijd7teis6zqmhwxl4u

Specifying sharemind's arithmetic black box

Peeter Laud, Alisa Pankova, Martin Pettai, Jaak Randmets
2013 Proceedings of the First ACM workshop on Language support for privacy-enhancing technologies - PETShop '13  
In this paper, we discuss the design choices and initial experiences with a domain-specific language and its optimizing compiler for specifying protocols for secure computation.  ...  ACKNOWLEDGEMENTS This work was supported by the European Social Fund through the ICT Doctoral School programme, and by the European Regional Development Fund through the Estonian Center of Excellence in Computer  ...  We see that this protocol requires two rounds, because there are paths in this graph that contain two solid edges. The intermediate representation is used to optimize the protocols.  ... 
doi:10.1145/2517872.2517874 dblp:conf/ccs/LaudPPR13 fatcat:exc2banu4zcsjiwhjbwhf27kwe

Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? [chapter]

Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
2014 Lecture Notes in Computer Science  
Coin tossing is a basic cryptographic task that allows two distrustful parties to obtain an unbiased random bit in a way that neither party can bias the output by deviating from the protocol or halting  ...  [TCC'11] took a step toward answering this question by showing that any black-box construction of optimallyfair coin tossing based on a one-way functions with n-bit input and output needs Ω(n/ log n) rounds  ...  There are actually several flavors of black-box reductions (fully black-box, semi black-box and weakly black-box [RTV04] ).  ... 
doi:10.1007/978-3-642-54242-8_10 fatcat:uqyrauwvhfaalay7hc5irbmhzu

Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator [chapter]

Ivan Damgård, Yuval Ishai
2005 Lecture Notes in Computer Science  
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator.  ...  Our protocol withstands an active, adaptive adversary corrupting a minority of the parties.  ...  Recently, Katz and Ostrovsky obtained a two-party protocol with an optimal exact round complexity [25] .  ... 
doi:10.1007/11535218_23 fatcat:uufcox6brfcqlddcjsfwn5o7sm

Page 5086 of Mathematical Reviews Vol. , Issue 93i [page]

1993 Mathematical Reviews  
This schematic algorithm uses a ‘black-box’ pro- cedure for communication, the output of which must meet two requirements: a global-order requirement and a deadlock-free re- quirement.  ...  The implementation of the black- box procedure in these models enables us to translate existing algorithms between the two models whenever these algorithms are based on the schematic algorithm.  ... 

Secure Multiparty RAM Computation in Constant Rounds [chapter]

Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
2016 Lecture Notes in Computer Science  
In this work, we consider the multi-party case and obtain the following results: -Semi-honest model : We present a constant-round black-box secure computation protocol for RAM programs.  ...  This protocol is obtained by building on the new black-box garbled RAM construction by Garg, Lu, and Ostrovsky [FOCS 2015], and constant-round secure computation protocol for circuits of Beaver, Micali  ...  This changed for the two-party setting with the recent results on garbled RAM [32, 14, 12] and its black-box variant [11] . 3 However, these round-efficient results are limited to the two-party setting  ... 
doi:10.1007/978-3-662-53641-4_19 fatcat:bpeqitkgqjdlraijgclxx62hdy

A Quantitative Approach to Reductions in Secure Computation [chapter]

Amos Beimel, Tal Malkin
2004 Lecture Notes in Computer Science  
However, without such a black box, not all functions can be securely computed.  ...  This gives rise to two types of functions, those that can be computed without a black box ("easy") and those that cannot ("hard"). However, no further distinction among the hard functions is made.  ...  We are also grateful to AT&T Labs-Research that hosted us for two weeks and for three years, respectively, during which part of this research was conducted.  ... 
doi:10.1007/978-3-540-24638-1_14 fatcat:khnh525o6vhrzfyg5nkceqg4fe

Private multiparty sampling and approximation of vector combinations

Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright
2009 Theoretical Computer Science  
Moreover, these results have some interesting consequences for the general problem of reducing sublinear-communication secure multiparty computation to two-party private information retrieval (PIR).  ...  The parties want to minimize communication and local computation while guaranteeing privacy in the sense that no party learns more than necessary.  ...  The protocol uses two-party OT in a black-box manner, has local computation complexity of NM O(1) , communication M O(1) , and round complexity O(1).  ... 
doi:10.1016/j.tcs.2008.12.062 fatcat:cmt6mwibyjen7ogguojyrdkfh4

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation [chapter]

Elette Boyle, Niv Gilboa, Yuval Ishai
2017 Lecture Notes in Computer Science  
. • Black-box use of group.  ...  We modify the succinct protocols of Boyle et al. so that they only make a black-box use of the underlying group, eliminating an expensive non-black-box setup phase. • Round complexity.  ...  Black-box use of group.  ... 
doi:10.1007/978-3-319-56614-6_6 fatcat:bhgipsvgsvd53caixzg45iybem

Efficient and Secure Evaluation of Multivariate Polynomials and Applications [chapter]

Matthew Franklin, Payman Mohassel
2010 Lecture Notes in Computer Science  
Non-black-box techniques require parties to prove in zero-knowledge, statements that involve the computation of the underlying primitives.  ...  Our protocols are round and communication efficient, and use the underlying cryptographic primitives in a black-box way.  ...  It is not clear how to extend our two-party protocol to the multiparty case while preserving the important features such as round and communication efficiency and/or the black-box use of the underlying  ... 
doi:10.1007/978-3-642-13708-2_15 fatcat:zrp7qxsdgbdsxmzmylxhfzdzum

Responsive Round Complexity and Concurrent Zero-Knowledge [chapter]

Tzafrir Cohen, Joe Kilian, Erez Petrank
2001 Lecture Notes in Computer Science  
The new protocol is a black-box concurrent zero knowledge proof for all languages in NP with round complexityÕ(log 2 n) but responsive round complexitỹ O(log n).  ...  Furthermore, in light of the known lower bounds, the responsive round complexity of this protocol is basically optimal.  ...  In this paper, we concentrate on black-box computational zero-knowledge, and use zero-knowledge as shorthand for black-box computational zero-knowledge.  ... 
doi:10.1007/3-540-45682-1_25 fatcat:xrljgk4zr5buzbpjf6cxlbq63a

A framework for analyzing RFID distance bounding protocols

Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardaş, Cédric Lauradoux, Benjamin Martin, Yingjiu Li, Jianying Zhou
2011 Journal of Computer Security  
It thus introduces some new concepts in the distance bounding domain as the black-box and white-box models, and the relation between the frauds with respect to these models.  ...  A man-in-the-middle (MITM) is a form of attack, where the adversary provokes or manipulates the communication between two parties.  ...  In this analysis, we consider both black-box and white-box prover model and we compute the success probabilities of each fraud.  ... 
doi:10.3233/jcs-2010-0408 fatcat:fz272dd3ljcnhdwmqvzezjplhm
« Previous Showing results 1 — 15 out of 19,992 results