Designing fully secure protocols for secure two-party computation of constant-domain functions
Mostra el registre complet Registre parcial de l'ítem
- dc.contributor.author Daza, Vanesa
- dc.contributor.author Makriyannis, Nikolaos
- dc.date.accessioned 2020-10-23T09:21:26Z
- dc.date.available 2020-10-23T09:21:26Z
- dc.date.issued 2017
- dc.description Comunicació presentada a la TCC 2017 Theory of Cryptography. Lecture Notes in Computer Science, celebrada a Baltimore (Estats Units d'Amèrica) del 12 al 15 de novembre de 2017.
- dc.description.abstract In a sense, a two-party protocol achieves fairness if the output from the computation is obtained simultaneously by both parties. A seminal result by Cleve (STOC 1986) states that fairness is impossible, in general. Surprisingly, Gordon et al. (JACM 2011) showed that there exist interesting functions that are computable with fairness. The two results give rise to a distinction between fair functions and unfair ones. The question of characterizing these functions has been studied in a sequence of works leading to the complete characterization of (symmetric) Boolean functions by Asharov et al. (TCC 2015). In this paper, we design new fully secure protocols for functions that were previously unknown to be fair. To this end, our main technical contribution is a generic construction of a fully secure (fair) protocol, starting with a constant-round protocol satisfying limited security requirements. Our construction introduces new conceptual tools for the analysis of fairness that apply to arbitrary (constant-domain) functions. While the characterization remains open, we believe that our results lay the foundation for a deeper understanding of fairness.en
- dc.description.sponsorship V. Daza—Research supported by Project TEC2015-66228-P (MINECO/FEDER, UE). N. Makriyannis—Research supported by ERC starting grant 638121.
- dc.format.mimetype application/pdf
- dc.identifier.citation Daza V, Makriyannis N. Designing fully secure protocols for secure two-party computation of constant-domain functions. In: Kalai Y, Reyzin L, editors. Theory of Cryptography. TCC 2017; 2017 Nov 12-5; Baltimore, USA. Berlin: Springer; 2017. p. 581-611. (LNCS; no. 10677). DOI: 10.1007/978-3-319-70500-2_20
- dc.identifier.doi http://dx.doi.org/10.1007/978-3-319-70500-2_20
- dc.identifier.uri http://hdl.handle.net/10230/45567
- dc.language.iso eng
- dc.publisher Springer
- dc.relation.ispartof Kalai Y, Reyzin L, editors. Theory of Cryptography. TCC 2017; 2017 Nov 12-5; Baltimore, USA. Berlin: Springer; 2017. p. 581-611. (LNCS; no. 10677)
- dc.relation.projectID info:eu-repo/grantAgreement/EC/H2020/638121
- dc.relation.projectID info:eu-repo/grantAgreement/ES/1PE/TEC2015-66228-P
- dc.rights © International Association for Cryptologic Research 2017
- dc.rights.accessRights info:eu-repo/semantics/openAccess
- dc.subject.keyword Fairnessen
- dc.subject.keyword Secure two-party computationen
- dc.subject.keyword Malicious adversariesen
- dc.subject.keyword Cryptographic protocolsen
- dc.title Designing fully secure protocols for secure two-party computation of constant-domain functionsen
- dc.type info:eu-repo/semantics/conferenceObject
- dc.type.version info:eu-repo/semantics/acceptedVersion