@inproceedings{2863966939c545f5aedb6c9be63b15bf,
title = "What security can we achieve within 4 rounds?",
abstract = "Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, Ostrovsky, Richelson and Scafuro (Crypto 2015) proved optimality of this result by showing how to realize arbitrary functionalities in four rounds where only one party receives the output via a black-box construction (and an extension to five rounds where both parties receive the output). In this paper we study the question of what security is achievable for stand-alone two-party protocols within four rounds. We first provide a four-round two-party protocol for coin-tossing that achieves 1/p-simulation security (i.e. simulation fails with probability at most 1/p+negl), in the presence of malicious corruptions. Next, we provide a four-round two-party protocol for general functionalities, where both parties receive the output, that achieves 1/p-security in the presence of malicious adversaries corrupting one of the parties, and full security in the presence of non-aborting malicious adversaries corrupting the other party. Next, we provide a three-round oblivious-transfer protocol, that achieves 1/p-simulation security against arbitrary malicious senders, while simultaneously guaranteeing a meaningful notion of privacy against malicious corruptions of either party. Finally, we show that the simulation-based security guarantees for our three-round protocols are optimal by proving that 1/p-simulation security is impossible to achieve against both parties in three rounds or less when requiring some minimal guarantees on the privacy of their inputs.",
keywords = "Coin-tossing, Oblivious transfer, Round complexity, Secure computation",
author = "Carmit Hazay and Muthuramakrishnan Venkitasubramaniam",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2016.; 10th International Conference on Security and Cryptography for Networks, SCN 2016 ; Conference date: 31-08-2016 Through 02-09-2016",
year = "2016",
doi = "https://doi.org/10.1007/978-3-319-44618-9_26",
language = "الإنجليزيّة",
isbn = "9783319446172",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "486--505",
editor = "{De Prisco}, Roberto and Vassilis Zikas",
booktitle = "Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings",
address = "ألمانيا",
}