TY - GEN
T1 - Secure two-party computation over unreliable channels
AU - Gelles, Ran
AU - Paskin-Cherniavsky, Anat
AU - Zikas, Vassilis
N1 - Publisher Copyright: © 2018, Springer Nature Switzerland AG.
PY - 2018
Y1 - 2018
N2 - We consider information-theoretic secure two-party computation in the plain model where no reliable channels are assumed, and all communication is performed over the binary symmetric channel (BSC) that flips each bit with fixed probability. In this reality-driven setting we investigate feasibility of communication-optimal noise-resilient semi-honest two-party computation i.e., efficient computation which is both private and correct despite channel noise. We devise an information-theoretic technique that converts any correct, but not necessarily private, two-party protocol that assumes reliable channels, into a protocol which is both correct and private against semi-honest adversaries, assuming BSC channels alone. Our results also apply to other types of noisy-channels such as the elastic-channel. Our construction combines tools from the cryptographic literature with tools from the literature on interactive coding, and achieves, to our knowledge, the best known communication overhead. Specifically, if f is given as a circuit of size s, our scheme communicates O(s+ κ) bits for κ a security parameter. This improves the state of the art (Ishai et al., CRYPTO’ 11) where the communication is O(s) + poly (κ· depth (s)).
AB - We consider information-theoretic secure two-party computation in the plain model where no reliable channels are assumed, and all communication is performed over the binary symmetric channel (BSC) that flips each bit with fixed probability. In this reality-driven setting we investigate feasibility of communication-optimal noise-resilient semi-honest two-party computation i.e., efficient computation which is both private and correct despite channel noise. We devise an information-theoretic technique that converts any correct, but not necessarily private, two-party protocol that assumes reliable channels, into a protocol which is both correct and private against semi-honest adversaries, assuming BSC channels alone. Our results also apply to other types of noisy-channels such as the elastic-channel. Our construction combines tools from the cryptographic literature with tools from the literature on interactive coding, and achieves, to our knowledge, the best known communication overhead. Specifically, if f is given as a circuit of size s, our scheme communicates O(s+ κ) bits for κ a security parameter. This improves the state of the art (Ishai et al., CRYPTO’ 11) where the communication is O(s) + poly (κ· depth (s)).
UR - http://www.scopus.com/inward/record.url?scp=85053592063&partnerID=8YFLogxK
U2 - https://doi.org/10.1007/978-3-319-98113-0_24
DO - https://doi.org/10.1007/978-3-319-98113-0_24
M3 - منشور من مؤتمر
SN - 9783319981123
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 445
EP - 463
BT - Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings
A2 - Catalano, Dario
A2 - De Prisco, Roberto
PB - Springer Verlag
T2 - 11th International Conference on Security and Cryptography for Networks, SCN 2018
Y2 - 5 September 2018 through 7 September 2018
ER -