In this paper we study the two-party setting in which at most one of the parties is adaptively corrupted, and demonstrate the feasibility of ({\bf 1}) NCE with constant number of public key operations for large message spaces. ({\bf 2}) Oblivious transfer with constant number of public key operations for large sender's input spaces, and ({\bf 3}) constant round secure computation protocols with an overall number of public key operations that is linear in the circuit size. Our study demonstrates that such primitives indeed exist in the presence of single corruptions without erasures, while this is not known for fully adaptive security under standard assumptions (where both parties may get corrupted). Our results are shown in the UC setting with a CRS setup.
Category / Keywords: Secure Two-Party Computation, Adaptive Security, Non-Committing Encryption, Oblivious Transfer Original Publication (with major differences): IACR-TCC-2014 Date: received 13 Sep 2013, last revised 14 Sep 2015 Contact author: carmit hazay at biu ac il,arpitapatra10@gmail com Available format(s): PDF | BibTeX Citation Version: 20150915:052815 (All versions of this report) Short URL: ia.cr/2013/593 Discussion forum: Show discussion | Start new discussion