TY - GEN
T1 - Black-box constructions of bounded-concurrent secure computation
AU - Garg, Sanjam
AU - Liang, Xiao
AU - Pandey, Omkant
AU - Visconti, Ivan
N1 - Publisher Copyright: © Springer Nature Switzerland AG 2020.
PY - 2020
Y1 - 2020
N2 - We construct a general purpose secure multiparty computation protocol which remains secure under (a-priori) bounded-concurrent composition and makes only black-box use of cryptographic primitives. Prior to our work, constructions of such protocols required non-black-box usage of cryptographic primitives; alternatively, black-box constructions could only be achieved for super-polynomial simulation based notions of security which offer incomparable security guarantees. Our protocol has a constant number of rounds and relies on standard polynomial-hardness assumptions, namely, the existence of semi-honest oblivious transfers and collision-resistant hash functions. Previously, such protocols were not known even under sub-exponential assumptions.
AB - We construct a general purpose secure multiparty computation protocol which remains secure under (a-priori) bounded-concurrent composition and makes only black-box use of cryptographic primitives. Prior to our work, constructions of such protocols required non-black-box usage of cryptographic primitives; alternatively, black-box constructions could only be achieved for super-polynomial simulation based notions of security which offer incomparable security guarantees. Our protocol has a constant number of rounds and relies on standard polynomial-hardness assumptions, namely, the existence of semi-honest oblivious transfers and collision-resistant hash functions. Previously, such protocols were not known even under sub-exponential assumptions.
KW - Black-box construction
KW - Bounded concurrent composition
KW - Multi-party computation
KW - Straight-line extraction
UR - https://www.scopus.com/pages/publications/85091177354
U2 - 10.1007/978-3-030-57990-6_5
DO - 10.1007/978-3-030-57990-6_5
M3 - Conference contribution
SN - 9783030579890
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 87
EP - 107
BT - Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings
A2 - Galdi, Clemente
A2 - Kolesnikov, Vladimir
PB - Springer Science and Business Media Deutschland GmbH
T2 - 12th International Conference on Security and Cryptography for Networks, SCN 2020
Y2 - 14 September 2020 through 16 September 2020
ER -