首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >On the Exact Round Complexity of Self-composable Two-Party Computation
【24h】

On the Exact Round Complexity of Self-composable Two-Party Computation

机译:自组成两方计算的精确轮次复杂度

获取原文

摘要

The round complexity of secure computation has been a fundamental problem in cryptography. Katz and Ostrovsky proved that 5 rounds are both necessary and sufficient for secure computation in the stand alone setting, thus resolving the exact round complexity of standalone secure computation. In contrast, round complexity of secure computation in the concurrent setting, where several protocols may run simultaneously, is poorly understood. Since standard polynomial time simulation is impossible in the concurrent setting, alternative security notions have been proposed, e.g., super-polynomial simulation (SPS). While SPS security can be achieved in constant rounds, the actual constant (> 20) is far from optimal. In this work, we take the first steps towards studying the exact round complexity of concurrent secure computation. We focus on the two party case and present a new secure computation protocol that achieves SPS security under concurrent self-composition. Our protocol has 5 rounds assuming quasi-polynomially-hard injective one-way functions (or 7 rounds assuming standard polynomially-hard collision-resistant hash functions). We also require other standard assumptions, specifically trapdoor OWPs and lossy TDFs. This matches the rounds for standalone secure computation. More specifically, our security proof presents a polynomial time reduction from SPS security to 3-round public-coin non-malleable commitments with appropriate extractability properties. Such commitments axe known based on quasi-polynomially-hard injective OWPs. (The reduction also works with a special 6-round non-malleable commitment to yield the 7-round result under CRHFs.)
机译:安全计算的全面复杂性一直是密码学中的一个基本问题。 Katz和Ostrovsky证明了在独立设置中进行安全计算需要进行5次回合,这足以解决独立安全计算的确切回合复杂性。相比之下,对并发设置中的安全计算的复杂度了解得很少,在并发设置中,多个协议可能同时运行。由于在并发设置中不可能进行标准多项式时间仿真,因此已经提出了替代性安全概念,例如超多项式仿真(SPS)。虽然可以在恒定回合中实现SPS安全性,但实际常数(> 20)远非最佳。在这项工作中,我们朝着研究并发安全计算的确切复杂度迈出了第一步。我们关注于两方情况,并提出了一种新的安全计算协议,该协议可在并发自我组合下实现SPS安全。我们的协议有5轮假设准多项式硬的单向注入函数(或7轮假设标准多项式硬的抗碰撞哈希函数)。我们还需要其他标准假设,特别是活板门OWP和有损TDF。这与用于独立安全计算的回合相匹配。更具体地说,我们的安全证明提出了从SPS安全性到具有适当可提取性属性的3轮公开硬币不可恶意承诺的多项式时间缩减。这样的承诺是基于准多项式内射式OWP已知的。 (减少也与特殊的6轮不可恶意承诺一起起作用,以在CRHF下产生7轮结果。)

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号