Paper 2018/372
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block, Divya Gupta, Hemanta K. Maji, and Hai H. Nguyen
Abstract
Most secure computation protocols can be effortlessly adapted to offload a significant fraction of their computationally and cryptographically expensive components to an offline phase so that the parties can run a fast online phase and perform their intended computation securely. During this offline phase, parties generate private shares of a sample generated from a particular joint distribution, referred to as the correlation. These shares, however, are susceptible to leakage attacks by adversarial parties, which can compromise the security of the entire secure computation protocol. The objective, therefore, is to preserve the security of the honest party despite the leakage performed by the adversary on her share.
Prior solutions, starting with
Metadata
- Available format(s)
-
PDF
- Publication info
- A minor revision of an IACR publication in TCC 2018
- Keywords
- Secure ComputationCorrelation ExtractorsLeakage Resilient CryptographyOblivious TransferError Correcting CodesSmall Bias Distributions
- Contact author(s)
- block9 @ purdue edu
- History
- 2018-12-10: last of 4 revisions
- 2018-04-30: received
- See all versions
- Short URL
- https://ia.cr/2018/372
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/372, author = {Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/372}, year = {2018}, url = {https://eprint.iacr.org/2018/372} }