请输入您要查询的百科知识:

 

词条 Secure two-party computation
释义

  1. Security

  2. See also

  3. References

Secure two-party computation (2PC) is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. The goal of 2PC is to create a generic protocol that allows two parties to jointly compute an arbitrary function on their inputs without sharing the value of their inputs with the opposing party. One of the most well known examples of 2PC is Yao's millionaire problem, in which two parties, Alice and Bob, are millionaires who wish to determine who is wealthier without revealing their wealth. Formally, Alice has wealth , Bob has wealth , and they wish to compute without revealing the values or .

Yao's garbled circuit protocol for two-party computation [1] only provided security against passive adversaries. 2PC protocols that are secure against active adversaries were proposed by Lindell and Pinkas,[2] Ishai, Prabhakaran and Sahai [3] and Nielsen and Orlandi.[4]

Another solution for this problem, that explicitly works with committed input was proposed by Jarecki and Shmatikov.[5]

Security

The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition. The idealised scenario involves a trusted party that collects the input of the two parties over secure channels and returns the result if none of the parties chooses to abort. The cryptographic two-party computation protocol is secure, if it behaves no worse than this ideal protocol, but without the additional trust assumptions. This is usually modeled using a simulator. The task of the simulator is to act as a wrapper around the idealised protocol to make it appear like the cryptographic protocol. The simulation succeeds with respect to an information theoretic, respectively computationally bounded adversary if the output of the simulator is statistically close to, respectively computationally indistinguishable from the output of the cryptographic protocol. A two-party computation protocol is secure, if for all adversaries there exists a successful simulator.

See also

  • An important primitive in 2PC is oblivious transfer.
  • Universal composability

References

1. ^{{Cite book | last1 = Yao | first1 = A. C. | title = 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982) | doi = 10.1109/SFCS.1982.38 | pages = 160–164 | year = 1982 | pmid = | pmc = | chapter = Protocols for secure computations }}
2. ^{{Cite book | last1 = Lindell | first1 = Y. | title = Advances in Cryptology - EUROCRYPT 2007 | last2 = Pinkas | first2 = B. | doi = 10.1007/978-3-540-72540-4_4 | volume = 4515 | pages = 52–78 | year = 2007 | pmid = | pmc = | series = Lecture Notes in Computer Science | isbn = 978-3-540-72539-8 }}
3. ^{{Cite book | last1 = Ishai | first1 = Y. | title = Advances in Cryptology – CRYPTO 2008 | last2 = Prabhakaran | first2 = M. | last3 = Sahai | first3 = A. | doi = 10.1007/978-3-540-85174-5_32 | volume = 5157 | pages = 572–591 | year = 2008 | pmid = | pmc = | series = Lecture Notes in Computer Science | isbn = 978-3-540-85173-8 }}
4. ^{{Cite book | last1 = Nielsen | first1 = J. B. | last2 = Orlandi | first2 = C. | doi = 10.1007/978-3-642-00457-5_22 | chapter = LEGO for Two-Party Secure Computation | title = Theory of Cryptography | series = Lecture Notes in Computer Science | volume = 5444 | pages = 368–386 | year = 2009 | isbn = 978-3-642-00456-8 | pmid = | pmc = | citeseerx = 10.1.1.215.4422 }}
5. ^{{Cite book | last1 = Jarecki | first1 = S. | title = Advances in Cryptology - EUROCRYPT 2007 | last2 = Shmatikov | first2 = V. | doi = 10.1007/978-3-540-72540-4_6 | volume = 4515 | pages = 97–114 | year = 2007 | pmid = | pmc = | series = Lecture Notes in Computer Science | isbn = 978-3-540-72539-8 }}
{{crypto-stub}}

1 : Cryptography

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/20 12:37:56