In this work we focus our attention on two important complexity measures of stateless token-based secure computation: round complexity and hardness assumptions and present the following results in the two-party setting:
[1] A round optimal generic secure protocol in the plain model assuming one-way functions, where the tokens are created by a single party.
[2] A round optimal generic UC secure protocol assuming one-way functions.
Our constructions are proven in the real/ideal paradigm with security in the presence of static malicious adversaries. As a side contribution, we identify a flaw in one of the feasibility results regarding UC secure protocols in the tamper proof model proved in the work of Goyal, Ishai, Sahai, Venkatesan and Wadia (TCC 2010) and correct history by attributing the work of Choi, Katz, Schro\"{o}der, Yerukhimovic and Zhou (TCC 2014) to establishing the (same) feasibility result.
Category / Keywords: Secure Computation, Tamper-Proof Hardware, Round Complexity, Minimal Assumptions Date: received 13 Sep 2015, last revised 9 Oct 2015 Contact author: carmit hazay at biu ac il Available format(s): PDF | BibTeX Citation Version: 20151009:172139 (All versions of this report) Short URL: ia.cr/2015/887 Discussion forum: Show discussion | Start new discussion