Paper 2014/098
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Gilad Asharov
Abstract
The well known impossibility result of Cleve (STOC 1986) implies that in general it is impossible to securely compute a function with \emph{complete fairness} without an honest majority. Since then, the accepted belief has been that \emph{nothing} non-trivial can be
computed with complete fairness in the two party setting. The surprising work of Gordon, Hazay, Katz and Lindell (STOC 2008) shows that this belief is false, and that there exist \emph{some} non-trivial (deterministic, finite-domain) boolean functions that can be computed fairly. This raises the fundamental question of characterizing complete fairness in secure two-party computation.
In this work we show that not only that some or few functions can be computed fairly, but rather an \emph{enormous number} of functions can be computed fairly. In fact, \emph{almost all} boolean functions with distinct domain sizes can be computed with complete fairness (for instance, more than
Note: Full version of the TCC 2014 paper.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- A major revision of an IACR publication in TCC 2014
- DOI
- 10.1007/978-3-642-54242-8_13
- Keywords
- Complete fairnesssecure two-party computationfoundationsmalicious adversaries.
- Contact author(s)
- asharog @ cs biu ac il
- History
- 2014-02-14: received
- Short URL
- https://ia.cr/2014/098
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/098, author = {Gilad Asharov}, title = {Towards Characterizing Complete Fairness in Secure Two-Party Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/098}, year = {2014}, doi = {10.1007/978-3-642-54242-8_13}, url = {https://eprint.iacr.org/2014/098} }