Leakage Resilient Secure Two-Party Computation

نویسندگان

  • Ivan Damgård
  • Carmit Hazay
  • Arpita Patra
چکیده

In the traditional secure function evaluation setting, some set of distrusting parties jointly compute a function of their respective inputs securely as if the computation is executed in an ideal setting where the parties send inputs to a trusted party that performs the computation and returns its result. Almost independently of secure computation, the area of leakage resilient cryptography has recently been evolving intensively, studying the question of designing cryptographic primitives that remain secure even when some information about the secret key is leaked. In this paper we initiate the study of secure two-party computation in the presence of leakage, where on top of corrupting one of the parties the adversary obtains leakage from the content of the secret memory of the honest party. Our study involves the following contributions: 1. Security Definitions. We formalize the notion of secure two-party computation in the presence of leakage and introduce security definitions in the ideal/real framework. Our formalization induces two types of adversarial attacks. We further study the feasibility of our definitions in the computational setting and explore some of the conditions under which these definitions are met. 2. Composition Theorems. We provide compositions theorems for our new modelings. Our results provide compositions theorems for the case where the inputs of the parties are sampled from a min-entropy source distribution. 3. Leakage resilient oblivious transfer. We present the first construction for 1-out-of-2 oblivious transfer with security against leakage of a constant fraction of the honest party’s memory. Our protocol is based on the OT construction presented by Peikert et al. [PVW08]. 4. Leakage resilient Yao’s Garbled Circuit [Yao82]. We provide the first general construction for secure two-party computation and show how to adapt the proof from [LP09] of Yao’s protocol into the leakage resilient setting. Our result holds for a restricted set of functions due to technicalities arise in the proof.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation

We consider unconditionally secure leakage resilient two-party computation, where security means that the leakage obtained by an adversary can be simulated using a similar amount of leakage from the private inputs or outputs. A related problem is known as circuit compilation, where there is only one device doing a computation on public input and output. Here the goal is to ensure that the adver...

متن کامل

On-Line/Off-Line Leakage Resilient Secure Computation Protocols

We study the question of designing leakage-resilient secure computation protocols. Our model is that of only computation leaks information with a leak-free input encoding phase. In more detail, we assume an offline phase called the input encoding phase in which each party encodes its input in a specified format. This phase is assumed to be free of any leakage and may or may not depend upon the ...

متن کامل

Impossibility of Black-Box Simulation Against Leakage Attacks

In this work, we show how to use the positive results on succinct argument systems to prove impossibility results on leakage-resilient black-box zero knowledge. This recently proposed notion of zero knowledge deals with an adversary that can make leakage queries on the state of the prover. Our result holds for black-box simulation only and we also give some insights on the non-black-box case. A...

متن کامل

Secure Computation against Adaptive Auxiliary Information

We study the problem of secure two-party and multiparty computation (MPC) in a setting where a cheating polynomial-time adversary can corrupt an arbitrary subset of parties and, in addition, learn arbitrary auxiliary information on the entire states of all honest parties (including their inputs and random coins), in an adaptive manner, throughout the protocol execution. We formalize a definitio...

متن کامل

A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations

Secure sum computation of private data inputs is an interesting example of Secure Multiparty Computation (SMC) which has attracted many researchers to devise secure protocols with lower probability of data leakage. In this paper, we provide a novel protocol to compute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011