Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

Download Now
Provided by: Bar-Ilan University
Topic: Security
Format: PDF
Protocols for secure two-party computation enable a pair of parties to compute a function of their inputs while preserving security properties such as privacy, correctness and independence of inputs. Recently, a number of protocols have been proposed for the efficient construction of two-party computation secure in the presence of malicious adversaries (where security is proven under the standard simulation-based ideal/real model paradigm for defining security). In this paper, the authors present a protocol for this task that follows the methodology of using cut-and-choose to boost Yao's protocol to be secure in the presence of malicious adversaries.
Download Now

Find By Topic