Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer

不经意传输 计算机科学 安全多方计算 安全两方计算 计算 安全参数 协议(科学) 承诺方案 对手 理论计算机科学 构造(python库) 传输(计算) 电子线路 功能(生物学) 密码学 计算机安全 算法 计算机网络 并行计算 医学 替代医学 病理 进化生物学 电气工程 生物 工程类
作者
Yongjun Wang,Kun Xiong,He Tian,Jing Zhang,Xixi Yan
出处
期刊:Security and Communication Networks [Hindawi Publishing Corporation]
卷期号:2022: 1-10 被引量:3
标识
DOI:10.1155/2022/3880413
摘要

In secure two-party computation, each party has its input and wants to jointly compute a function from which it obtains the output corresponding to its respective inputs. For achieving security against a malicious adversary, an effective approach is using cut-and-choose, which requires the circuit constructor P1 to construct S copies of the circuit C (C is used to compute the function F). The circuit evaluator P2 selects S∕2 circuits to open for the check. If these S∕2 circuits are correctly constructed, P2 assumes that the remaining S∕2 circuits are also correctly constructed and uses the remaining circuits to compute. However, this method introduces significant computational complexity and interactive rounds, mainly due to more circuits that must be used for security purposes and the need for multiple interactions to transmit the keys. In this paper, regarding the issue above, we present a novel secure two-party computation protocol, and it can achieve security against the malicious adversary. Concretely, we still use the idea of cut-and-choose but improve the cut-and-choose oblivious transfer (CCOT) of the usual secure two-party computation protocol into cut-and-choose bilateral oblivious transfer (CCBOT) and propose a variant of it that we call batch single-choice CCBOT, which makes our protocol only needs two rounds of interaction to complete the transmission of all keys and 28Sl of exponentiations. In addition, we use a check mechanism to prevent the case that p1 cheats, but P2 is powerless. Our proposed protocol with an error probability of 2–s of P1 significantly optimizes the communication rounds and computation overheads, solves the selective failure attack, and ensures the consistency of the input.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
大个应助运气贼好的熊猫采纳,获得10
刚刚
刚刚
985博士发布了新的文献求助10
刚刚
卡拉米完成签到,获得积分10
1秒前
1秒前
XXF发布了新的文献求助10
1秒前
1秒前
科研通AI5应助gxy采纳,获得30
3秒前
慕青应助fanxing采纳,获得10
3秒前
传奇3应助源气满满采纳,获得10
3秒前
oblivious发布了新的文献求助10
3秒前
3秒前
4秒前
贾舒涵发布了新的文献求助30
4秒前
4秒前
Berlin发布了新的文献求助10
5秒前
研友_Z3vemn发布了新的文献求助10
5秒前
6秒前
6秒前
6秒前
LELE发布了新的文献求助10
6秒前
7秒前
7秒前
科研通AI5应助起风了采纳,获得10
7秒前
zx666发布了新的文献求助10
7秒前
善学以致用应助皇甫妙竹采纳,获得10
7秒前
7秒前
8秒前
Star1983发布了新的文献求助10
8秒前
猪猪hero发布了新的文献求助10
9秒前
chu发布了新的文献求助10
10秒前
泥巴发布了新的文献求助10
10秒前
Winnie完成签到,获得积分20
10秒前
刘傻完成签到,获得积分10
11秒前
田様应助未末木采纳,获得10
11秒前
11秒前
12秒前
fanxing完成签到,获得积分20
12秒前
12秒前
沉默洋葱发布了新的文献求助10
12秒前
高分求助中
Les Mantodea de Guyane Insecta, Polyneoptera 2500
Introduction to Strong Mixing Conditions Volumes 1-3 500
Technologies supporting mass customization of apparel: A pilot project 450
China—Art—Modernity: A Critical Introduction to Chinese Visual Expression from the Beginning of the Twentieth Century to the Present Day 430
Tip60 complex regulates eggshell formation and oviposition in the white-backed planthopper, providing effective targets for pest control 400
A Field Guide to the Amphibians and Reptiles of Madagascar - Frank Glaw and Miguel Vences - 3rd Edition 400
China Gadabouts: New Frontiers of Humanitarian Nursing, 1941–51 400
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3794025
求助须知:如何正确求助?哪些是违规求助? 3338915
关于积分的说明 10293004
捐赠科研通 3055424
什么是DOI,文献DOI怎么找? 1676641
邀请新用户注册赠送积分活动 804614
科研通“疑难数据库(出版商)”最低求助积分说明 762015