Abstract
We propose a new, constant-round protocol for multi-party computation of boolean circuits that is secure against an arbitrary number of malicious corruptions. At a high level, we extend and generalize recent work of Wang et al. in the two-party setting. Namely, we design an efficient preprocessing phase that allows the parties to generate authenticated information; we then show how to use this information to distributively construct a single "authenticated" garbled circuit that is evaluated by one party.
Original language | English (US) |
---|---|
Title of host publication | CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | Association for Computing Machinery |
Pages | 39-56 |
Number of pages | 18 |
ISBN (Electronic) | 9781450349468 |
DOIs | |
State | Published - Oct 30 2017 |
Event | 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 - Dallas, United States Duration: Oct 30 2017 → Nov 3 2017 |
Publication series
Name | Proceedings of the ACM Conference on Computer and Communications Security |
---|---|
ISSN (Print) | 1543-7221 |
Conference
Conference | 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 |
---|---|
Country/Territory | United States |
City | Dallas |
Period | 10/30/17 → 11/3/17 |
Funding
This material is based onwork supported by NSF awards #1111599, #1563722, and #1564088. Portions of this work were also supported by DARPA and SPAWAR under contract N66001-15-C-4065
ASJC Scopus subject areas
- Software
- Computer Networks and Communications