Abdolmaleki, B., Badrinarayanan, S., Fernando, R. et al. (3 more authors) (2023) Two-round concurrent 2PC from sub-exponential LWE. In: Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part I. 29th International Conference on the Theory and Application of Cryptology and Information Security, 04-08 Dec 2023, Guangzhou, China. Lecture Notes in Computer Science, LNCS 14438 . Springer Nature Singapore , pp. 71-105. ISBN 9789819987207
Abstract
Secure computation is a cornerstone of modern cryptography and a rich body of research is devoted to understanding its round complexity. In this work, we consider two-party computation (2PC) protocols (where both parties receive output) that remain secure in the realistic setting where many instances of the protocol are executed in parallel (concurrent security). We obtain a two-round concurrent-secure 2PC protocol based on a single, standard, post-quantum assumption: The subexponential hardness of the learning-with-errors (LWE) problem. Our protocol is in the plain model, i.e., it has no trusted setup, and it is secure in the super-polynomial simulation framework of Pass (EUROCRYPT 2003). Since two rounds are minimal for (concurrent) 2PC, this work resolves the round complexity of concurrent 2PC from standard assumptions.
As immediate applications, our work establishes feasibility results for interesting cryptographic primitives, such as the first two-round password authentication key exchange (PAKE) protocol in the plain model and the first two-round concurrent secure computation protocol for quantum circuits (2PQC).
Metadata
Item Type: | Proceedings Paper |
---|---|
Authors/Creators: |
|
Copyright, Publisher and Additional Information: | © 2023 International Association for Cryptologic Research. This is an author-produced version of a paper subsequently published in Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part I. Uploaded in accordance with the publisher's self-archiving policy. |
Keywords: | Distributed Computing and Systems Software; Information and Computing Sciences; Cybersecurity and Privacy |
Dates: |
|
Institution: | The University of Sheffield |
Academic Units: | The University of Sheffield > Faculty of Engineering (Sheffield) > Department of Computer Science (Sheffield) |
Depositing User: | Symplectic Sheffield |
Date Deposited: | 07 Feb 2024 17:00 |
Last Modified: | 18 Dec 2024 01:13 |
Status: | Published |
Publisher: | Springer Nature Singapore |
Series Name: | Lecture Notes in Computer Science |
Refereed: | Yes |
Identification Number: | 10.1007/978-981-99-8721-4_3 |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:208924 |