Paper 2022/1288

Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT

Yuval Ishai, Technion – Israel Institute of Technology
Dakshita Khurana, University of Illinois Urbana-Champaign
Amit Sahai, University of California, Los Angeles
Akshayaram Srinivasan, Tata Institute of Fundamental Research
Abstract

We give round-optimal {\em black-box} constructions of two-party and multiparty protocols in the common random/reference string (CRS) model, with security against malicious adversaries, based on any two-round oblivious transfer (OT) protocol in the same model. Specifically, we obtain two types of results. \begin{enumerate} \item {\bf Two-party protocol.} We give a (two-round) {\it two-sided NISC} protocol that makes black-box use of two-round (malicious-secure) OT in the CRS model. In contrast to the standard setting of non-interactive secure computation (NISC), two-sided NISC allows communication from both parties in each round and delivers the output to both parties at the end of the protocol. Prior black-box constructions of two-sided NISC relied on idealized setup assumptions such as OT correlations, or were proven secure in the random oracle model. \item {\bf Multiparty protocol.} We give a three-round secure multiparty computation protocol for an arbitrary number of parties making black-box use of a two-round OT in the CRS model. The round optimality of this construction follows from a black-box impossibility proof of Applebaum et al. (ITCS 2020). Prior constructions either required the use of random oracles, or were based on two-round malicious-secure OT protocols that satisfied additional security properties. \end{enumerate}

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in TCC 2022
Contact author(s)
yuvali @ cs technion il
dakshita @ illinois edu
sahai @ cs ucla edu
akshayaram srinivasan @ tifr res in
History
2022-09-28: approved
2022-09-28: received
See all versions
Short URL
https://ia.cr/2022/1288
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1288,
      author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan},
      title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/1288},
      year = {2022},
      url = {https://eprint.iacr.org/2022/1288}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.