CryptoDB
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Authors: | |
---|---|
Download: | |
Abstract: | Until recently, most research on the topic of secure computation focused on the stand-alone model, where a single protocol execution takes place. In this paper, we construct protocols for the setting of {\em bounded-concurrent self composition}, where a (single) secure protocol is run many times concurrently, and there is a predetermined bound on the number of concurrent executions. In short, we show that {\em any} two-party functionality can be securely computed under bounded-concurrent self composition, in the {\sf plain model} (where the only setup assumption made is that the parties communicate via authenticated channels). Our protocol provides the first feasibility result for general two-party computation in the plain model, {\em for any model of concurrency}. All previous protocols assumed a trusted setup phase in order to obtain a common reference string. On the downside, the number of rounds of communication in our protocol is super-linear in the bound on the number of concurrent executions. However, we believe that our constructions will lead to more efficient protocols for this task. |
BibTeX
@misc{eprint-2003-11815, title={Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model}, booktitle={IACR Eprint archive}, keywords={foundations / secure two-party computation, concurrent self composition, setup assumptions}, url={http://eprint.iacr.org/2003/100}, note={STOC 2003 lindell@us.ibm.com 12556 received 23 May 2003, last revised 18 May 2004}, author={Yehuda Lindell}, year=2003 }