University of Tartu - ©2011 unruh - Last update: 16.06.2011 16:53
Date: 17/06/2011 Location: J. Liivi 2, room 317 (next to the coffee room)
Title: The Use of Circuit Evaluation Techniques for Secure Computation
Abstract:
Secure two-party computation problem is about two parties that want to compute some function of their private inputs in a way that other party won't learn it. We describe a general way to perform secure two-party computation of a function specied as a boolean circuit, which was proposed by A.A. Yao in 1982. This method is named Yao garbled circuit evaluation and is secure against semi-honest adversaries. We present a new e cient protocol for secure two-party computation Circus, that is secure against malicious adversary in consistency model. Consistency model implies that either both parties will receive correct output and persist privacy of their inputs or a honest party will know, that is was cheated and that adversary potentially have learnt 1 bit of other party's input value. We specify all necessary sub-protocols and their security requirements and prove security of Circus in malicious environment.