Title
Adaptively Secure Computation for RAM Programs
Abstract
In this work, we study the communication complexity of secure multiparty computation under minimal assumptions in the presence of an adversary that can adaptively corrupt all parties eventually. Specifically, we are interested in understanding the complexity when modeling the underlying function as a RAM program. Under minimal assumptions, the work of Canetti et al. (STOC 2017) and Benhamouda et al. (TCC 2018) give protocols whose communication complexity grows quadratically in the circuit size when the computation is expressed as a Boolean circuit. In this work, we obtain the first two-round two-party computation protocol, which is secure against adaptive adversaries who can adaptively corrupt all parties where the communication complexity is proportional to the square of the RAM complexity of the function up to polylogarithmic factors assuming the existence of non-committing encryption.
Year
DOI
Venue
2022
10.1007/978-3-031-07085-3_7
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II
Keywords
DocType
Volume
Adaptive security, Garbled RAM, Secure computation, Oblivious RAM
Conference
13276
ISSN
Citations 
PageRank 
0302-9743
0
0.34
References 
Authors
0
4