Title :
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution
Author :
Yan Huang ; Katz, Justin ; Evans, D.
Abstract :
Known protocols for secure two-party computation that are designed to provide full security against malicious behavior are significantly less efficient than protocols intended only to thwart semi-honest adversaries. We present a concrete design and implementation of protocols achieving security guarantees that are much stronger than are possible with semi-honest protocols, at minimal extra cost. Specifically, we consider protocols in which a malicious adversary may learn a single (arbitrary) bit of additional information about the honest party´s input. Correctness of the honest party´s output is still guaranteed. Adapting prior work of Mohassel and Franklin, the basic idea in our protocols is to conduct two separate runs of a (specific) semi-honest, garbled-circuit protocol, with the parties swapping roles, followed by an inexpensive secure equality test. We provide a rigorous definition and prove that this protocol leaks no more than one additional bit against a malicious adversary. In addition, we propose some heuristic enhancements to reduce the overall information a cheating adversary learns. Our experiments show that protocols meeting this security level can be implemented at cost very close to that of protocols that only achieve semi-honest security. Our results indicate that this model enables the large-scale, practical applications possible within the semi-honest security model, while providing dramatically stronger security guarantees.
Keywords :
cryptographic protocols; Quid-Pro-Quo-tocols; dual execution; garbled-circuit protocol; heuristic enhancement; inexpensive secure equality test; malicious adversary; malicious behavior; rigorous definition; secure two-party computation; security guarantee; semihonest adversary; semihonest protocols; semihonest security level; semihonest security model; swapping roles; Computational modeling; Cryptography; Generators; Logic gates; Protocols; Wires; privacy-preserving protocols; secure two-party computation;
Conference_Titel :
Security and Privacy (SP), 2012 IEEE Symposium on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4673-1244-8
Electronic_ISBN :
1081-6011