Sciweavers

STOC
2006
ACM

Black-box constructions for secure computation

14 years 11 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majority requires computational assumptions. We study the way such computational assumptions are used. Specifically, we ask whether the secure protocol can use the underlying primitive (e.g., one-way trapdoor permutation) in a black-box way, or must it be nonblack-box (by referring to the code that computes this primitive)? Despite the fact that many general constructions of cryptographic schemes (e.g., CPA-secure encryption) refer to the underlying primitive in a black-box way only, there are some constructions that are inherently nonblack-box. Indeed, all known constructions of protocols for general secure computation that are secure in the presence of a malicious adversary and without an honest majority use the underlying primitive in a nonblack-box way (requiring to prove in zero-knowledge statements that relat...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere
Added 03 Dec 2009
Updated 03 Dec 2009
Type Conference
Year 2006
Where STOC
Authors Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
Comments (0)