Furthermore, our protocols are highly efficient. Specifically, in the interactive setting, our commitment and general computation protocols are much more efficient than the best known ones due to Lindell [Crypto’11,’13] which are secure in the common reference string model. In the non-interactive setting, our protocols are slightly less efficient than the best known ones presented by Afshar et al. [Eurocrypt ’14] but do away with the need to rely on a non-global (programmable) reference string.
Category / Keywords: foundations / Efficient Secure 2PC, UC-security, Global Random Oracle. Original Publication (with major differences): ACM CCS 2014 Date: received 4 Nov 2014, last revised 16 Nov 2014 Contact author: alescafu at gmail com Available format(s): PDF | BibTeX Citation Note: Full version. Version: 20141116:182219 (All versions of this report) Short URL: ia.cr/2014/908 Discussion forum: Show discussion | Start new discussion