CryptoDB
On the Power of Secure Two-Party Computation
Authors: | |
---|---|
Download: | |
Abstract: | Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007 ; SIAM J Comput 39(3):1121–1152, 2009 ) introduced the powerful “MPC-in-the-head” technique that provided a general transformation of information-theoretic MPC protocols secure against passive adversaries to a ZK proof in a “black-box” way. In this work, we extend this technique and provide a generic transformation of any semi-honest secure two-party computation (2PC) protocol (with mild adaptive security guarantees) in the so-called oblivious-transfer hybrid model to an adaptive ZK proof for any |
BibTeX
@article{jofc-2020-30110, title={On the Power of Secure Two-Party Computation}, journal={Journal of Cryptology}, publisher={Springer}, volume={33}, pages={271-318}, doi={10.1007/s00145-019-09314-2}, author={Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, year=2020 }