Reusable Non-Interactive Secure Computation
- Melissa Chase ,
- Yevgeniy Dodis ,
- Yuval Ishai ,
- Daniel Kraschewski ,
- Tianren Liu ,
- Rafail Ostrovsky ,
- Vinod Vaikuntanathan
Crypto 2019 |
Published by Springer, Cham
Publication | Publication | Publication | Publication | PDF
We consider the problem of Non-Interactive Two-Party Secure Computation (NISC), where Rachel wishes to publish an encryption of her input x, in such a way that any other party, who holds an input y, can send her a single message which conveys to her the value f(x, y), and nothing more. We demand security against malicious parties. While such protocols are easy to construct using garbled circuits and general non-interactive zero-knowledge proofs, this approach inherently makes a non-black-box use of the underlying cryptographic primitives and is infeasible in practice.