Loading…
Fast Two-Output Secure Computation with Optimal Error Probability
Cut-and-choose paradigm makes Yao’s protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal...
Saved in:
Published in: | 电子学报:英文版 2017 (5), p.933-941 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 941 |
container_issue | 5 |
container_start_page | 933 |
container_title | 电子学报:英文版 |
container_volume | |
creator | ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie |
description | Cut-and-choose paradigm makes Yao’s protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal error probability.We transform multi-phase cut-and-choose for singleoutput case into one that can deal with two-output functions,meanwhile maintaining the optimal error probability.Based on this new paradigm,we propose an efficient two-output secure computation protocol.Besides,by utilizing the specific property of the output garbled keys,we solve the authenticity issue of the generator’s output with only symmetric cryptographic operations linear in the output length of the generator,which is the most efficient method so far in standard model without Random oracle(RO). |
format | article |
fullrecord | <record><control><sourceid>chongqing</sourceid><recordid>TN_cdi_chongqing_primary_69689088504849554853484855</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>69689088504849554853484855</cqvip_id><sourcerecordid>69689088504849554853484855</sourcerecordid><originalsourceid>FETCH-chongqing_primary_696890885048495548534848553</originalsourceid><addsrcrecordid>eNqdizEKgzAUQDO0UGm9Qy4gxCY_jWMRpZuFuksUqwE1Nvki3r4OPUGn997wDiSI2fUaCQn8RELvTc0g5vIGkgfknmuPtFxtVCw4L0hfbbO4lqZ23EujsRNdDfa0mNGMeqCZc9bRp7O1rs1gcLuQ41sPvg1_PBOeZ2X6iJreTt3HTF01u311WyUTqRKmFDChRAIgFPDdFAD_7_oCC6dAZA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Fast Two-Output Secure Computation with Optimal Error Probability</title><source>IET Digital Library - eJournals</source><source>IEEE Xplore All Journals</source><creator>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</creator><creatorcontrib>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</creatorcontrib><description>Cut-and-choose paradigm makes Yao’s protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal error probability.We transform multi-phase cut-and-choose for singleoutput case into one that can deal with two-output functions,meanwhile maintaining the optimal error probability.Based on this new paradigm,we propose an efficient two-output secure computation protocol.Besides,by utilizing the specific property of the output garbled keys,we solve the authenticity issue of the generator’s output with only symmetric cryptographic operations linear in the output length of the generator,which is the most efficient method so far in standard model without Random oracle(RO).</description><identifier>ISSN: 1022-4653</identifier><language>eng</language><ispartof>电子学报:英文版, 2017 (5), p.933-941</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/86774X/86774X.jpg</thumbnail><link.rule.ids>314,776,780,4010</link.rule.ids></links><search><creatorcontrib>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</creatorcontrib><title>Fast Two-Output Secure Computation with Optimal Error Probability</title><title>电子学报:英文版</title><addtitle>Chinese Journal of Electronics</addtitle><description>Cut-and-choose paradigm makes Yao’s protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal error probability.We transform multi-phase cut-and-choose for singleoutput case into one that can deal with two-output functions,meanwhile maintaining the optimal error probability.Based on this new paradigm,we propose an efficient two-output secure computation protocol.Besides,by utilizing the specific property of the output garbled keys,we solve the authenticity issue of the generator’s output with only symmetric cryptographic operations linear in the output length of the generator,which is the most efficient method so far in standard model without Random oracle(RO).</description><issn>1022-4653</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNqdizEKgzAUQDO0UGm9Qy4gxCY_jWMRpZuFuksUqwE1Nvki3r4OPUGn997wDiSI2fUaCQn8RELvTc0g5vIGkgfknmuPtFxtVCw4L0hfbbO4lqZ23EujsRNdDfa0mNGMeqCZc9bRp7O1rs1gcLuQ41sPvg1_PBOeZ2X6iJreTt3HTF01u311WyUTqRKmFDChRAIgFPDdFAD_7_oCC6dAZA</recordid><startdate>2017</startdate><enddate>2017</enddate><creator>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope></search><sort><creationdate>2017</creationdate><title>Fast Two-Output Secure Computation with Optimal Error Probability</title><author>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-chongqing_primary_696890885048495548534848553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库- 镜像站点</collection><jtitle>电子学报:英文版</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>ZHAO Chuan JIANG Han XU Qiuliang WANG Yilei WEI Xiaochao CUI Shujie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fast Two-Output Secure Computation with Optimal Error Probability</atitle><jtitle>电子学报:英文版</jtitle><addtitle>Chinese Journal of Electronics</addtitle><date>2017</date><risdate>2017</risdate><issue>5</issue><spage>933</spage><epage>941</epage><pages>933-941</pages><issn>1022-4653</issn><abstract>Cut-and-choose paradigm makes Yao’s protocol for two-party computation secure in malicious model with an error probability.In CRYPTO 2013,based on multi-phase cut-and-choose,Lindell reduced this probability to the optimal value.However,this work can only compute single-output functions with optimal error probability.We transform multi-phase cut-and-choose for singleoutput case into one that can deal with two-output functions,meanwhile maintaining the optimal error probability.Based on this new paradigm,we propose an efficient two-output secure computation protocol.Besides,by utilizing the specific property of the output garbled keys,we solve the authenticity issue of the generator’s output with only symmetric cryptographic operations linear in the output length of the generator,which is the most efficient method so far in standard model without Random oracle(RO).</abstract></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-4653 |
ispartof | 电子学报:英文版, 2017 (5), p.933-941 |
issn | 1022-4653 |
language | eng |
recordid | cdi_chongqing_primary_69689088504849554853484855 |
source | IET Digital Library - eJournals; IEEE Xplore All Journals |
title | Fast Two-Output Secure Computation with Optimal Error Probability |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T23%3A19%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-chongqing&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fast%20Two-Output%20Secure%20Computation%20with%20Optimal%20Error%20Probability&rft.jtitle=%E7%94%B5%E5%AD%90%E5%AD%A6%E6%8A%A5%EF%BC%9A%E8%8B%B1%E6%96%87%E7%89%88&rft.au=ZHAO%20Chuan%20JIANG%20Han%20XU%20Qiuliang%20WANG%20Yilei%20WEI%20Xiaochao%20CUI%20Shujie&rft.date=2017&rft.issue=5&rft.spage=933&rft.epage=941&rft.pages=933-941&rft.issn=1022-4653&rft_id=info:doi/&rft_dat=%3Cchongqing%3E69689088504849554853484855%3C/chongqing%3E%3Cgrp_id%3Ecdi_FETCH-chongqing_primary_696890885048495548534848553%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_cqvip_id=69689088504849554853484855&rfr_iscdi=true |