MPC-Friendly Commitments for Publicly Verifiable Covert Security
@article{Agrawal2021MPCFriendlyCF, title={MPC-Friendly Commitments for Publicly Verifiable Covert Security}, author={Nitin Agrawal and James Bell and Adria Gasc'on and Matt J. Kusner}, journal={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security}, year={2021} }
We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value x to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that x was indeed the value inputted into the secure computation. Our constructions operate in the publicly verifiable covert (PVC) security model, which is a relaxation of the malicious model of MPC, appropriate inβ¦Β
Figures and Tables from this paper
References
SHOWING 1-10 OF 53 REFERENCES
Efficiently Enforcing Input Validity in Secure Two-party Computation
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2016
A protocol in which only the underlying function is garbled Ο times, and the predicate checks are each garbled only once is shown, which can lead to huge savings in communication and computation.
Global-Scale Secure Multiparty Computation
- Computer Science, MathematicsCCS
- 2017
This work designs an efficient preprocessing phase that allows the parties to generate authenticated information; it shows how to use this information to distributively construct a single "authenticated" garbled circuit that is evaluated by one party.
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries
- Computer Science, MathematicsJournal of Cryptology
- 2015
A cut-and-choose protocol for secure computation based on garbled circuits, with security in the presence of malicious adversaries, that vastly improves on all previous protocols of this type and relies on the decisional DiffieβHellman assumption.
Calling out Cheaters: Covert Security With Public Verifiability
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2012
This work proposes (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party's input.
On Garbling Schemes with and Without Privacy
- Computer Science, MathematicsSCN
- 2016
This work shows that, for a certain class of circuits, one can reduce this overhead for two-party function evaluation with security against cheating parties SFE, and additionally shows how to integrate this solution with the SFE protocol of [5], thus reducing the overhead even further.
More efficient oblivious transfer and extensions for faster secure computation
- Computer Science, MathematicsCCS
- 2013
This work proposes a novel OT protocol with security in the standard model and improves OT extensions with respect to communication complexity, computation complexity, and scalability and demonstrates the importance of correctly implementing OT within secure computation protocols by presenting an attack on the FastGC framework.
Universally Composable Commitments
- Computer Science, MathematicsCRYPTO
- 2001
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantees that commitment protocols behave like an "ideal commitment service,"β¦
Secure Multiparty Computation (MPC)
- Mathematics, Computer ScienceIACR Cryptol. ePrint Arch.
- 2020
What MPC is, what problems it solves, and how it is being currently used are reviewed, and many highly relevant works are not cited.
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Computer Science, MathematicsJournal of Cryptology
- 2009
The notion of covert adversaries is introduced, which is believed to faithfully models the adversarial behavior in many commercial, political, and social settings and it is shown that it is possible to obtain highly efficient protocols that are secure against such adversaries.
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
- Computer Science, MathematicsCCS
- 2017
The work shows that the performance penalty for maliciously secure two-party computation (as compared to semi-honest security) is much smaller than previously believed.