Download Efficient Secure Two-Party Protocols: Techniques and by Carmit Hazay PDF

By Carmit Hazay

The authors current a accomplished research of effective protocols and strategies for safe two-party computation – either normal buildings that may be used to safely compute any performance, and protocols for particular difficulties of curiosity. The e-book specializes in strategies for developing effective protocols and proving them safe. moreover, the authors examine diversified definitional paradigms and evaluate the potency of protocols accomplished below those varied definitions.

The publication opens with a basic creation to safe computation after which offers definitions of safety for a couple of diversified adversary versions and definitional paradigms. within the moment half, the ebook exhibits how any performance might be securely computed in an effective manner within the presence of semi-honest, malicious and covert adversaries. those common buildings offer a foundation for knowing the feasibility of safe computation, and they're an excellent advent to layout paradigms and evidence thoughts for effective protocols. within the ultimate half, the booklet provides particular buildings of significance. The authors start with an in-depth examine of sigma protocols and nil wisdom, concentrating on safe computation, they usually then offer a entire learn of the basic oblivious move functionality. ranging from protocols that in attaining privateness basically, they express hugely effective buildings that in attaining protection within the presence of malicious adversaries for either a unmarried and a number of batch executions. Oblivious pseudorandom functionality assessment is then offered as a right away program of oblivious move. eventually, the booklet concludes with examples of high-level protocol difficulties that reveal how particular houses of an issue may be exploited to achieve excessive potency: securely computing the kth-ranked aspect, and safe database and textual content seek.

This e-book is vital for practitioners and researchers within the box of safe protocols, fairly people with a spotlight on potency, and for researchers within the zone of privacy-preserving information mining. This publication is also used as a textbook for a complicated direction on safe protocols.

Show description

Read or Download Efficient Secure Two-Party Protocols: Techniques and Constructions PDF

Similar information theory books

Information theory: structural models for qualitative data

Krippendorff introduces social scientists to details idea and explains its program for structural modeling. He discusses key subject matters similar to: how one can make sure a data thought version; its use in exploratory learn; and the way it compares with different ways similar to community research, direction research, chi sq. and research of variance.

Ours To Hack and To Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet

The on-demand economic system is reversing the rights and protections staff fought for hundreds of years to win. traditional web clients, in the meantime, hold little keep watch over over their own facts. whereas promising to be the nice equalizers, on-line structures have frequently exacerbated social inequalities. Can the web be owned and ruled otherwise?

Extra resources for Efficient Secure Two-Party Protocols: Techniques and Constructions

Example text

It turns out that this intuitive idea is very hard to implement correctly, and many new problems arise when computing with many circuits. As a result, the construction is much less efficient than in the semi-honest case. However, it can still be run on circuits with tens of thousands of gates, as will be discussed below. Covert adversaries. In Chapter 5 we present a protocol that is based on the same idea as that in Chapter 4 but provides security only in the presence of covert adversaries. The main idea is that in the context of covert adversaries it suffices to use cut-and-choose on many fewer circuits, and it suffices to compute only one circuit at the end.

Adversary instructs trusted party to continue or halt: A sends either continue or aborti to the trusted party. If it sends continue, the trusted party sends fj (x′ , y ′ ) to party Pj (where Pj is the honest party). Otherwise, if A sends aborti , the trusted party sends aborti to party Pj . Outputs: The honest party always outputs the output value it obtained from the trusted party. The corrupted party outputs nothing. The adversary A outputs any arbitrary (probabilistic polynomial-time computable) function of the initial input of the corrupted party, the auxiliary input z, and the value fi (x′ , y ′ ) obtained from the trusted party.

If the adversary sent cheati , then the ideal execution ends at this point. Otherwise, the ideal execution continues below. , it sends the corrupted party its output). Adversary instructs trusted party to continue or halt: After receiving its output, the adversary sends either continue or aborti to the trusted party. If the trusted party receives continue then it sends fj (x′ , y ′ ) to the honest party Pj . Otherwise, if it receives aborti , it sends aborti to the honest party Pj . Outputs: The honest party always outputs the output value it obtained from the trusted party.

Download PDF sample

Rated 4.44 of 5 – based on 47 votes