Cryptology ePrint Archive: Report 2015/887

Round-Optimal Token-Based Secure Computation

Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam

Abstract: Secure computation in the presence of tamper-proof hardware tokens is proven under the assumption that the holder of the token is only given black-box access to the functionality of the token. Starting with the work of Goldreich and Ostrovsky [GoldreichO96], a long series of works studied tamper-proof hardware for realizing two-party functionalities in a variety of settings.

In this work we focus our attention on two important complexity measures of stateless token-based secure computation: round complexity and hardness assumptions and present the following results in the two-party setting:

[1] A round optimal generic secure protocol in the plain model assuming one-way functions, where the tokens are created by a single party.

[2] A round optimal generic UC secure protocol assuming one-way functions.

Our constructions are proven in the real/ideal paradigm with security in the presence of static malicious adversaries. As a side contribution, we identify a flaw in one of the feasibility results regarding UC secure protocols in the tamper proof model proved in the work of Goyal, Ishai, Sahai, Venkatesan and Wadia (TCC 2010) and correct history by attributing the work of Choi, Katz, Schro\"{o}der, Yerukhimovic and Zhou (TCC 2014) to establishing the (same) feasibility result.

Category / Keywords: Secure Computation, Tamper-Proof Hardware, Round Complexity, Minimal Assumptions

Date: received 13 Sep 2015, last revised 9 Oct 2015

Contact author: carmit hazay at biu ac il

Available format(s): PDF | BibTeX Citation

Version: 20151009:172139 (All versions of this report)

Short URL: ia.cr/2015/887

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]