The limits of common coins: further results

  • Authors:
  • Hemanta K. Maji;Manoj Prabhakaran

  • Affiliations:
  • University of California, Los Angeles;University of Illinois, Urbana-Champaign

  • Venue:
  • INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In [8] it was shown that the coin-tossing functionality $\mathcal{F}_{coin}$ has limited use in 2-party secure function evaluation (SFE) in the computationally unbounded (a.k.a information-theoretic) setting. Further it was shown that for $\mathcal{F}_{coin}$ to be useful in securely realizing any one in a a large class of symmetric SFE (SSFE) functionalities, a certain computational assumption (namely the existence of a semi-honest secure OT protocol) is necessary and sufficient. In this work, we close a gap in the class of SSFE functionalities for which this result was proven in [8]: we show that $\mathcal{F}_{coin}$ can be used to securely realize any SSFE functionality that cannot be realized in the computationally unbounded setting, if and only if there exists a semi-honest secure OT protocol.