Authors
Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
Publication date
2017/11/17
Book
International Conference on the Theory and Application of Cryptology and Information Security
Pages
275-303
Publisher
Springer International Publishing
Description
We study the feasibility of two-message protocols for secure two-party computation in the plain model, for functionalities that deliver output to one party, with security against malicious parties. Since known impossibility results rule out polynomial-time simulation in this setting, we consider the common relaxation of allowing super-polynomial simulation.
We first address the case of zero-knowledge functionalities. We present a new construction of two-message zero-knowledge protocols with super-polynomial simulation from any (sub-exponentially hard) game-based two-message oblivious transfer protocol, which we call Weak OT. As a corollary, we get the first two-message WI arguments for NP from (sub-exponential) DDH. Prior to our work, such protocols could only be constructed from assumptions that are known to imply non-interactive zero-knowledge protocols (NIZK), which do not include DDH …
Total citations
201720182019202020212022202349913141013
Scholar articles
S Badrinarayanan, S Garg, Y Ishai, A Sahai, A Wadia - International Conference on the Theory and …, 2017