计算机科学
不经意传输
安全两方计算
协议(科学)
承诺方案
架空(工程)
对手
计算
安全多方计算
量子计算机
通信复杂性
计算机安全
计算机网络
理论计算机科学
量子
密码学
算法
操作系统
物理
病理
医学
替代医学
量子力学
作者
Yanfeng Huo,Zongqu Zhao,Panke Qin,Shujing Wang,Cheng Zheng
摘要
Summary Secure two‐party computation allows a pair of parties to compute a function together while keeping their inputs private. Ultimately, each party receives only its own correct output. In this paper, a post‐quantum secure two‐party computation protocol is proposed that can be used to effectively block malicious parties. The protocol solves the problems of traditional protocols based on garbled circuits, which are vulnerable to quantum attacks, high communication costs and low computational efficiency. The input garbled keys of the circuit constructor is structured as a Learning with Error (LWE) equation, enabling the circuit constructor to employ a zero‐knowledge proof that demonstrates the uniformity of inputs across all circuits.In the key transfer phase, an LWE‐based batch single‐choice cut‐and‐choose oblivious transfer is proposed to avoid selective failure attacks. In addition, the protocol employs a penalty mechanism to detect if the circuit constructor has generated an incorrect circuit. We have compared the communication overhead of this protocol with three other secure two‐party computation protocols based on Cut‐and‐Choose technology. The analytical results show that this protocol has the best error probability and is resilient to quantum attacks under the malicious adversary model. In addition, with appropriate parameters, the protocol is able to reduce its communication bandwidth by an average of 40.41%.
科研通智能强力驱动
Strongly Powered by AbleSci AI