[Resource Topic] 2013/099: Constant-round secure two-party computation from a linear number of oblivious transfer

Welcome to the resource topic for 2013/099

Title:
Constant-round secure two-party computation from a linear number of oblivious transfer

Authors: Samuel Ranellucci, Alain Tapp

Abstract:

We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard model which improves previous protocols in several ways. We are able to reduce the number of calls to Oblivious Transfer by a factor proportional to the security parameter. In addition to being more efficient than previous instantiations, our protocol only requires black box calls to OT and Commitment. This is achieved by the use of a faulty variant of the Cut-and-Choose OT. The concepts of Garbling Schemes, faulty Cut-and-Choose Oblivious Transfer and Privacy Amplification are combined using the Cut-and-Choose paradigm to obtain the final protocol.

ePrint: https://eprint.iacr.org/2013/099

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .