Two-message, oblivious evaluation of cryptographic functionalities

Authored book
(Volume of book series)


Publication Details

Author(s): Döttling N, Fleischhacker N, Krupp J, Schröder D
Publisher: Springer Verlag
Publishing place: Heidelberg
Publication year: 2016
Title of series: Advances in Cryptology – CRYPTO 2016. CRYPTO 2016.
Volume: 9816
Pages range: 619-648
ISBN: 9783662530146
Language: English


Abstract


We study the problem of two round oblivious evaluation of cryptographic functionalities. In this setting, one party P holds a private key sk for a provably secure instance of a cryptographic functionality F and the second party P wishes to evaluate F on a value x. Although it has been known for 22 years that general functionalities cannot be computed securely in the presence of malicious adversaries with only two rounds of communication, we show the existence of a round optimal protocol that obliviously evaluates cryptographic functionalities. Our protocol is provably secure against malicious receivers under standard assumptions and does not rely on heuristic (setup) assumptions. Our main technical contribution is a novel nonblack-box technique, which makes nonblack-box use of the security reduction of F. Specifically, our proof of malicious receiver security uses the code of the reduction, which reduces the security of F to some hard problem, in order to break that problem directly. Instantiating our framework, we obtain the first two-round oblivious pseudorandom function that is secure in the standard model. This question was left open since the invention of OPRFs in 1997.



FAU Authors / FAU Editors

Döttling, Nico Prof. Dr.
Juniorprofessur für Kryptographische Protokolle
Schröder, Dominique Prof. Dr.
Lehrstuhl für Informatik 13 (Angewandte Kryptographie)


How to cite

APA:
Döttling, N., Fleischhacker, N., Krupp, J., & Schröder, D. (2016). Two-message, oblivious evaluation of cryptographic functionalities. Heidelberg: Springer Verlag.

MLA:
Döttling, Nico, et al. Two-message, oblivious evaluation of cryptographic functionalities. Heidelberg: Springer Verlag, 2016.

BibTeX: 

Last updated on 2018-06-08 at 17:38