Paper 2014/759
How to Efficiently Evaluate RAM Programs with Malicious Security
Arash Afshar, Zhangxiang Hu, Payman Mohassel, and Mike Rosulek
Abstract
Secure 2-party computation (2PC) is becoming practical for some applications. However, most approaches are limited by the fact that the desired functionality must be represented as a boolean circuit. In response, random-access machines (RAM programs) have recently been investigated as a promising alternative representation.
In this work, we present the first practical protocols for evaluating RAM programs with security against malicious adversaries. A useful efficiency measure is to divide the cost of malicious-secure evaluation of
Note: Clarified references to SCVM
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- A major revision of an IACR publication in EUROCRYPT 2015
- Keywords
- secure computationoblivious ram
- Contact author(s)
- rosulekm @ eecs oregonstate edu
- History
- 2015-01-30: last of 3 revisions
- 2014-09-29: received
- See all versions
- Short URL
- https://ia.cr/2014/759
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/759, author = {Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {How to Efficiently Evaluate {RAM} Programs with Malicious Security}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/759}, year = {2014}, url = {https://eprint.iacr.org/2014/759} }