An improved secure two-party computation protocol

  • Authors:
  • Yu Yu;Jussipekka Leiwo;Benjamin Premkumar

  • Affiliations:
  • School of Computer Engineering, Nanyang Technological University, Singapore;School of Computer Engineering, Nanyang Technological University, Singapore;School of Computer Engineering, Nanyang Technological University, Singapore

  • Venue:
  • CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Alice and Bob with their private inputs xn and yn respectively, want to compute fn(xn, yn) for some publicly known function fn without disclosing information regarding their private inputs more than what can be inferred from fn(xn, yn). This problem is referred to as a secure two-party computation and Yao proposed a solution to privately compute fn using garbled circuits. In this paper, we improve the efficiency of circuit by hardwiring the input of Alice in the circuit without compromising privacy. Using a typical two-party computation problem, namely, the Millionaire Problem, we show that our method reduces circuit size significantly specially for circuits whose fan-in is bounded by 2. We also show that the protocol using the reduced circuit is provably secure.