2014
DOI: 10.1007/978-3-642-54242-8_16
|View full text |Cite
|
Sign up to set email alerts
|

One-Sided Adaptively Secure Two-Party Computation

Abstract: Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where "hackers" actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in designing adaptively secure protocols is a non-committing encryption (NCE) that implements secure communication channe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 50 publications
(111 reference statements)
0
8
0
Order By: Relevance
“…The proof from [HP14] is shown in the one-sided setting where either the sender or the receiver are corrupted, but not both. In case both parties are corrupted it seems infeasible to prove security since the parties are required to use fake keys/ciphertexts for equivocation, but at the same time explain the keys and ciphertexts as valid.…”
Section: String Nce With Partial Erasuresmentioning
confidence: 99%
See 3 more Smart Citations
“…The proof from [HP14] is shown in the one-sided setting where either the sender or the receiver are corrupted, but not both. In case both parties are corrupted it seems infeasible to prove security since the parties are required to use fake keys/ciphertexts for equivocation, but at the same time explain the keys and ciphertexts as valid.…”
Section: String Nce With Partial Erasuresmentioning
confidence: 99%
“…In this section we prove that a slightly modified version of the NCE construction from [HP14] is NCE with partial erasures, which only requires a constant number of PKE operations per polynomiallength message. This construction is built on two IND-CPA secure primitives with an additional equivocation property.…”
Section: String Nce With Partial Erasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…In the case where all but one of the parties can be corrupted, [36,34] and [35,27] including the concurrent work of [18], propose constant round two-party and multi-party protocols, respectively. On the other hand, round complexity of all know adaptively secure protocols secure against an arbitrary number of corruptions grows (see, e.g.…”
Section: Introductionmentioning
confidence: 99%