Loading…

Completeness for Symmetric Two-Party Functionalities: Revisited

Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography. A rich body of work has been dedicated to understanding the complexity of cryptographic tasks in the context of (semi-honest) secure two-party computation. M...

Full description

Saved in:
Bibliographic Details
Published in:Journal of cryptology 2018-07, Vol.31 (3), p.671-697
Main Authors: Lindell, Yehuda, Omri, Eran, Zarosim, Hila
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083
cites cdi_FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083
container_end_page 697
container_issue 3
container_start_page 671
container_title Journal of cryptology
container_volume 31
creator Lindell, Yehuda
Omri, Eran
Zarosim, Hila
description Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography. A rich body of work has been dedicated to understanding the complexity of cryptographic tasks in the context of (semi-honest) secure two-party computation. Much of this work has focused on the characterization of trivial and complete functionalities (resp., functionalities that can be securely implemented unconditionally, and functionalities that can be used to securely compute all functionalities). Most previous works define reductions via an ideal implementation of the functionality; i.e., f reduces to g if one can implement f using a black-box (or oracle) that computes the function g and returns the output to both parties. Such a reduction models the computation of f as an atomic operation . However, in the real world, protocols proceed in rounds, and the output is not learned by the parties simultaneously. In this paper, we show that this distinction is significant. Specifically, we show that there exist symmetric functionalities (where both parties receive the same outcome) that are neither trivial nor complete under “black-box reductions,” and yet the existence of a constant-round protocol for securely computing such a functionality implies infinitely often oblivious transfer (meaning that it is secure for infinitely many values of the security parameter). In light of the above, we propose an alternative definitional infrastructure for studying the triviality and completeness of functionalities.
doi_str_mv 10.1007/s00145-017-9267-7
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2047358053</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2047358053</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083</originalsourceid><addsrcrecordid>eNp1kE1LAzEURYMoWKs_wN2A6-jLVzPjRqRYFQqK1nVIpm8kpTOpSWrpv3fKCK5cvc05l_suIZcMrhmAvkkATCoKTNOKTzTVR2TEpOCUCV0ekxFUQlCuKzglZymtelorLUbkbhrazRozdphS0YRYvO_bFnP0dbHYBfpqY94Xs21XZx86u_bZY7ot3vDbJ59xeU5OGrtOePF7x-Rj9rCYPtH5y-Pz9H5Oa6GqTEuslEPrnATlQCpdCwlOauRQOVs2DZdcOFHDRE6UWDYlA8aWTFpVgRZQijG5GnI3MXxtMWWzCtvYF0qGg9RClaBET7GBqmNIKWJjNtG3Nu4NA3PYyQw7mf59c9jJ6N7hg5N6tvvE-Jf8v_QDOCtppQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2047358053</pqid></control><display><type>article</type><title>Completeness for Symmetric Two-Party Functionalities: Revisited</title><source>Springer Nature</source><creator>Lindell, Yehuda ; Omri, Eran ; Zarosim, Hila</creator><creatorcontrib>Lindell, Yehuda ; Omri, Eran ; Zarosim, Hila</creatorcontrib><description>Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography. A rich body of work has been dedicated to understanding the complexity of cryptographic tasks in the context of (semi-honest) secure two-party computation. Much of this work has focused on the characterization of trivial and complete functionalities (resp., functionalities that can be securely implemented unconditionally, and functionalities that can be used to securely compute all functionalities). Most previous works define reductions via an ideal implementation of the functionality; i.e., f reduces to g if one can implement f using a black-box (or oracle) that computes the function g and returns the output to both parties. Such a reduction models the computation of f as an atomic operation . However, in the real world, protocols proceed in rounds, and the output is not learned by the parties simultaneously. In this paper, we show that this distinction is significant. Specifically, we show that there exist symmetric functionalities (where both parties receive the same outcome) that are neither trivial nor complete under “black-box reductions,” and yet the existence of a constant-round protocol for securely computing such a functionality implies infinitely often oblivious transfer (meaning that it is secure for infinitely many values of the security parameter). In light of the above, we propose an alternative definitional infrastructure for studying the triviality and completeness of functionalities.</description><identifier>ISSN: 0933-2790</identifier><identifier>EISSN: 1432-1378</identifier><identifier>DOI: 10.1007/s00145-017-9267-7</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Coding and Information Theory ; Combinatorics ; Communications Engineering ; Completeness ; Computation ; Computational Mathematics and Numerical Analysis ; Computer Science ; Cryptography ; Cybersecurity ; Networks ; Probability Theory and Stochastic Processes ; Task complexity</subject><ispartof>Journal of cryptology, 2018-07, Vol.31 (3), p.671-697</ispartof><rights>International Association for Cryptologic Research 2017</rights><rights>International Association for Cryptologic Research 2017.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083</citedby><cites>FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Lindell, Yehuda</creatorcontrib><creatorcontrib>Omri, Eran</creatorcontrib><creatorcontrib>Zarosim, Hila</creatorcontrib><title>Completeness for Symmetric Two-Party Functionalities: Revisited</title><title>Journal of cryptology</title><addtitle>J Cryptol</addtitle><description>Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography. A rich body of work has been dedicated to understanding the complexity of cryptographic tasks in the context of (semi-honest) secure two-party computation. Much of this work has focused on the characterization of trivial and complete functionalities (resp., functionalities that can be securely implemented unconditionally, and functionalities that can be used to securely compute all functionalities). Most previous works define reductions via an ideal implementation of the functionality; i.e., f reduces to g if one can implement f using a black-box (or oracle) that computes the function g and returns the output to both parties. Such a reduction models the computation of f as an atomic operation . However, in the real world, protocols proceed in rounds, and the output is not learned by the parties simultaneously. In this paper, we show that this distinction is significant. Specifically, we show that there exist symmetric functionalities (where both parties receive the same outcome) that are neither trivial nor complete under “black-box reductions,” and yet the existence of a constant-round protocol for securely computing such a functionality implies infinitely often oblivious transfer (meaning that it is secure for infinitely many values of the security parameter). In light of the above, we propose an alternative definitional infrastructure for studying the triviality and completeness of functionalities.</description><subject>Coding and Information Theory</subject><subject>Combinatorics</subject><subject>Communications Engineering</subject><subject>Completeness</subject><subject>Computation</subject><subject>Computational Mathematics and Numerical Analysis</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Cybersecurity</subject><subject>Networks</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Task complexity</subject><issn>0933-2790</issn><issn>1432-1378</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1kE1LAzEURYMoWKs_wN2A6-jLVzPjRqRYFQqK1nVIpm8kpTOpSWrpv3fKCK5cvc05l_suIZcMrhmAvkkATCoKTNOKTzTVR2TEpOCUCV0ekxFUQlCuKzglZymtelorLUbkbhrazRozdphS0YRYvO_bFnP0dbHYBfpqY94Xs21XZx86u_bZY7ot3vDbJ59xeU5OGrtOePF7x-Rj9rCYPtH5y-Pz9H5Oa6GqTEuslEPrnATlQCpdCwlOauRQOVs2DZdcOFHDRE6UWDYlA8aWTFpVgRZQijG5GnI3MXxtMWWzCtvYF0qGg9RClaBET7GBqmNIKWJjNtG3Nu4NA3PYyQw7mf59c9jJ6N7hg5N6tvvE-Jf8v_QDOCtppQ</recordid><startdate>20180701</startdate><enddate>20180701</enddate><creator>Lindell, Yehuda</creator><creator>Omri, Eran</creator><creator>Zarosim, Hila</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20180701</creationdate><title>Completeness for Symmetric Two-Party Functionalities: Revisited</title><author>Lindell, Yehuda ; Omri, Eran ; Zarosim, Hila</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Coding and Information Theory</topic><topic>Combinatorics</topic><topic>Communications Engineering</topic><topic>Completeness</topic><topic>Computation</topic><topic>Computational Mathematics and Numerical Analysis</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Cybersecurity</topic><topic>Networks</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Task complexity</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lindell, Yehuda</creatorcontrib><creatorcontrib>Omri, Eran</creatorcontrib><creatorcontrib>Zarosim, Hila</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lindell, Yehuda</au><au>Omri, Eran</au><au>Zarosim, Hila</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Completeness for Symmetric Two-Party Functionalities: Revisited</atitle><jtitle>Journal of cryptology</jtitle><stitle>J Cryptol</stitle><date>2018-07-01</date><risdate>2018</risdate><volume>31</volume><issue>3</issue><spage>671</spage><epage>697</epage><pages>671-697</pages><issn>0933-2790</issn><eissn>1432-1378</eissn><abstract>Understanding the minimal assumptions required for carrying out cryptographic tasks is one of the fundamental goals of theoretic cryptography. A rich body of work has been dedicated to understanding the complexity of cryptographic tasks in the context of (semi-honest) secure two-party computation. Much of this work has focused on the characterization of trivial and complete functionalities (resp., functionalities that can be securely implemented unconditionally, and functionalities that can be used to securely compute all functionalities). Most previous works define reductions via an ideal implementation of the functionality; i.e., f reduces to g if one can implement f using a black-box (or oracle) that computes the function g and returns the output to both parties. Such a reduction models the computation of f as an atomic operation . However, in the real world, protocols proceed in rounds, and the output is not learned by the parties simultaneously. In this paper, we show that this distinction is significant. Specifically, we show that there exist symmetric functionalities (where both parties receive the same outcome) that are neither trivial nor complete under “black-box reductions,” and yet the existence of a constant-round protocol for securely computing such a functionality implies infinitely often oblivious transfer (meaning that it is secure for infinitely many values of the security parameter). In light of the above, we propose an alternative definitional infrastructure for studying the triviality and completeness of functionalities.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s00145-017-9267-7</doi><tpages>27</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0933-2790
ispartof Journal of cryptology, 2018-07, Vol.31 (3), p.671-697
issn 0933-2790
1432-1378
language eng
recordid cdi_proquest_journals_2047358053
source Springer Nature
subjects Coding and Information Theory
Combinatorics
Communications Engineering
Completeness
Computation
Computational Mathematics and Numerical Analysis
Computer Science
Cryptography
Cybersecurity
Networks
Probability Theory and Stochastic Processes
Task complexity
title Completeness for Symmetric Two-Party Functionalities: Revisited
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T20%3A20%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Completeness%20for%20Symmetric%20Two-Party%20Functionalities:%20Revisited&rft.jtitle=Journal%20of%20cryptology&rft.au=Lindell,%20Yehuda&rft.date=2018-07-01&rft.volume=31&rft.issue=3&rft.spage=671&rft.epage=697&rft.pages=671-697&rft.issn=0933-2790&rft.eissn=1432-1378&rft_id=info:doi/10.1007/s00145-017-9267-7&rft_dat=%3Cproquest_cross%3E2047358053%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c359t-8e95beabb405b0457c340b47e209ba8ff2423b3c064653df81011d14a59073083%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2047358053&rft_id=info:pmid/&rfr_iscdi=true