[Resource Topic] 2014/845: Adaptively secure two-party computation from indistinguishability obfuscation

Welcome to the resource topic for 2014/845

Title:
Adaptively secure two-party computation from indistinguishability obfuscation

Authors: Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya

Abstract:

We present the first two-round, two-party general function evaluation protocol that is secure against honest-but-curious adaptive corruption of both parties. In addition, the protocol is incoercible for one of the parties, and fully leakage tolerant. It requires a global (non-programmable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. A Byzantine version of the protocol, obtained by applying the Canetti et al. [STOC 02] compiler, achieves UC security with comparable efficiency parameters, but is no longer incoercible.

ePrint: https://eprint.iacr.org/2014/845

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .