Publication:
Efficiently making secure two-party computation fair

dc.contributor.coauthorN/A
dc.contributor.departmentN/A
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorKılınç, Handan
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuprofileMaster Student
dc.contributor.kuprofileFaculty Member
dc.contributor.otherDepartment of Computer Engineering
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.yokidN/A
dc.contributor.yokid168060
dc.date.accessioned2024-11-10T00:05:48Z
dc.date.issued2017
dc.description.abstractSecure two-party computation cannot be fair against malicious adversaries, unless a trusted third party (TTP) or a gradual-release type super-constant round protocol is employed. Existing optimistic fair two-party computation protocols with constant rounds are either too costly to arbitrate (e.g., the TTP may need to re-do almost the whole computation), or require the use of electronic payments. Furthermore, most of the existing solutions were proven secure and fair via a partial simulation, which, we show, may lead to insecurity overall. We propose a new framework for fair and secure two-party computation that can be applied on top of any secure two party computation protocol based on Yao’s garbled circuits and zero-knowledge proofs. We show that our fairness overhead is minimal, compared to all known existing work. Furthermore, our protocol is fair even in terms of the work performed by Alice and Bob. We also prove our protocol is fair and secure simultaneously, through one simulator, which guarantees that our fairness extensions do not leak any private information. Lastly, we ensure that the TTP never learns the inputs or outputs of the computation. Therefore, even if the TTP becomes malicious and causes unfairness by colluding with one party, the security of the underlying protocol is still preserved.
dc.description.indexedbyWoS
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.sponsorshipTUBITAK
dc.description.sponsorshipScientific and Technological Research Council of Turkey [111E019]
dc.description.sponsorshipEuropean Union COST Action [IC1306] The authors acknowledge the support of TUBITAK, the Scientific and Technological Research Council of Turkey, under project number 111E019, and European Union COST Action IC1306.
dc.description.volume9603
dc.identifier.doi10.1007/978-3-662-54970-4_11
dc.identifier.eissn1611-3349
dc.identifier.isbn978-3-662-54970-4
dc.identifier.isbn978-3-662-54969-8
dc.identifier.issn0302-9743
dc.identifier.scopus2-s2.0-85019749311
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-662-54970-4_11
dc.identifier.urihttps://hdl.handle.net/20.500.14288/16500
dc.identifier.wos456825800011
dc.keywordsN/A
dc.languageEnglish
dc.publisherSpringer International Publishing Ag
dc.sourceFinancial Cryptography and Data Security, Fc 2016
dc.subjectComputer science
dc.titleEfficiently making secure two-party computation fair
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authoridN/A
local.contributor.authorid0000-0003-2099-2206
local.contributor.kuauthorKılınç, Handan
local.contributor.kuauthorKüpçü, Alptekin
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae

Files