Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

  • Authors:
  • Yehuda Lindell;Benny Pinkas;Nigel P. Smart

  • Affiliations:
  • Dept. Of Computer Science, Bar Ilan University, Ramat Gan, Israel;Dept. of Computer Science, University of Haifa, Haifa, Israel 31905;Dept. Computer Science, University of Bristol, Bristol, United Kingdom BS8 1UB

  • Venue:
  • SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running system which provides security against malicious adversaries according to rigorous security definition and without using the random oracle model. We ran experiments showing that the protocol is practical. In addition we show that there is little benefit in replacing subcomponents secure in the standard model with those which are only secure in the random oracle model. Throughout we pay particular attention to using the most efficient subcomponents in the protocol, and we select parameters for the encryption schemes, commitments and oblivious transfers which are consistent with a security level equivalent to AES-128.