Concurrently Composable Non-interactive Secure Computation

Andrew Morgan, Rafael Pass

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We consider the feasibility of non-interactive secure two-party computation (NISC) in the plain model satisfying the notion of superpolynomial-time simulation (SPS). While stand-alone secure SPS-NISC protocols are known from standard assumptions (Badrinarayanan et al., Asiacrypt 2017), it has remained an open problem to construct a concurrently composable SPS-NISC. Prior to our work, the best protocols require 5 rounds (Garg et al., Eurocrypt 2017), or 3 simultaneous-message rounds (Badrinarayanan et al., TCC 2017). In this work, we demonstrate the first concurrently composable SPS-NISC. Our construction assumes the existence of: a non-interactive (weakly) CCA-secure commitment,a stand-alone secure SPS-NISC with subexponential security, and satisfies the notion of “angel-based” UC security (i.e., UC with a superpolynomial-time helper) with perfect correctness. We additionally demonstrate that both of the primitives we use (albeit only with polynomial security) are necessary for such concurrently composable SPS-NISC with perfect correctness. As such, our work identifies essentially necessary and sufficient primitives for concurrently composable SPS-NISC with perfect correctness in the plain model.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings
EditorsShweta Agrawal, Dongdai Lin
PublisherSpringer Science and Business Media Deutschland GmbH
Pages526-555
Number of pages30
ISBN (Print)9783031229626
DOIs
StatePublished - 2022
Externally publishedYes
Event28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022 - Taipei, Taiwan, Province of China
Duration: 5 Dec 20229 Dec 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13791 LNCS

Conference

Conference28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022
Country/TerritoryTaiwan, Province of China
CityTaipei
Period5/12/229/12/22

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Concurrently Composable Non-interactive Secure Computation'. Together they form a unique fingerprint.

Cite this