当前位置: X-MOL 学术J. Cryptol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
High-Performance Multi-party Computation for Binary Circuits Based on Oblivious Transfer
Journal of Cryptology ( IF 2.3 ) Pub Date : 2021-06-30 , DOI: 10.1007/s00145-021-09403-1
Sai Sheshank Burra , Enrique Larraia , Jesper Buus Nielsen , Peter Sebastian Nordholt , Claudio Orlandi , Emmanuela Orsini , Peter Scholl , Nigel P. Smart

We present a unified view of the two-party and multi-party computation protocols based on oblivious transfer first outlined in Nielsen et al. (CRYPTO 2012) and Larraia et al. (CRYPTO 2014). We present a number of modifications and improvements to these earlier presentations, as well as full proofs of the entire protocol. Improvements include a unified pre-processing and online MAC methodology, mechanisms to pass between different MAC variants and fixing a minor bug in the protocol of Larraia et al. in relation to a selective failure attack. It also fixes a minor bug in Nielsen et al. resulting from using Jensen’s inequality in the wrong direction in an analysis.



中文翻译:

基于Oblivious Transfer的二元电路高性能多方计算

我们基于 Nielsen 等人首先概述的不经意传输提出了两方和多方计算协议的统一视图。(CRYPTO 2012) 和 Larraia 等人。(加密 2014)。我们对这些早期的演示文稿进行了一些修改和改进,以及整个协议的完整证明。改进包括统一的预处理和在线 MAC 方法、在不同 MAC 变体之间传递的机制以及修复 Larraia 等人的协议中的一个小错误。与选择性失败攻击有关。它还修复了 Nielsen 等人的一个小错误。由于在分析中以错误的方向使用 Jensen 不等式而导致的。

更新日期:2021-07-01
down
wechat
bug