Constant-Round Secure Two-Party Computation from a Linear Number of Oblivious Transfer

Download Now
Provided by: Universite de Moncton
Topic: Security
Format: PDF
The authors construct a protocol for constant round two-party secure function evaluation in the standard model which improves previous protocols in several ways. They are able to reduce the number of calls to oblivious transfer by a factor proportional to the security parameter. In addition to being more efficient than previous instantiations, their protocol only requires black box calls to OT and commitment. This is achieved by the use of a faulty variant of the cut-and-choose OT. The concepts of garbling schemes, faulty cut-and-choose oblivious transfer and privacy amplification are combined using the cut-and-choose paradigm to obtain the final protocol.
Download Now

Find By Topic