We construct a general purpose secure multiparty computation protocol which remains secure under (a-priori) bounded-concurrent composition and makes only black-box use of cryptographic primitives. Prior to our work, constructions of such protocols required non-black-box usage of cryptographic primitives; alternatively, black-box constructions could only be achieved for super-polynomial simulation based notions of security which offer incomparable security guarantees. Our protocol has a constant number of rounds and relies on standard polynomial-hardness assumptions, namely, the existence of semi-honest oblivious transfers and collision-resistant hash functions. Previously, such protocols were not known even under sub-exponential assumptions.

Black-box constructions of bounded-concurrent secure computation / Garg, Sanjam; Liang, Xiao; Pandey, Omkant; Visconti, Ivan. - 12238:(2020), pp. 87-107. (Intervento presentato al convegno Conference on Security and Cryptography for Networks tenutosi a Amalfi; Italy) [10.1007/978-3-030-57990-6_5].

Black-box constructions of bounded-concurrent secure computation

Ivan Visconti
2020

Abstract

We construct a general purpose secure multiparty computation protocol which remains secure under (a-priori) bounded-concurrent composition and makes only black-box use of cryptographic primitives. Prior to our work, constructions of such protocols required non-black-box usage of cryptographic primitives; alternatively, black-box constructions could only be achieved for super-polynomial simulation based notions of security which offer incomparable security guarantees. Our protocol has a constant number of rounds and relies on standard polynomial-hardness assumptions, namely, the existence of semi-honest oblivious transfers and collision-resistant hash functions. Previously, such protocols were not known even under sub-exponential assumptions.
2020
Conference on Security and Cryptography for Networks
Black-box construction; Bounded concurrent composition; Multi-party computation; Straight-line extraction
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Black-box constructions of bounded-concurrent secure computation / Garg, Sanjam; Liang, Xiao; Pandey, Omkant; Visconti, Ivan. - 12238:(2020), pp. 87-107. (Intervento presentato al convegno Conference on Security and Cryptography for Networks tenutosi a Amalfi; Italy) [10.1007/978-3-030-57990-6_5].
File allegati a questo prodotto
File Dimensione Formato  
Garg_Black-Box_2020.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 446.73 kB
Formato Adobe PDF
446.73 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1718878
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact