Efficient Secure Two-Party Protocols
Carmit Hazay, Yehuda Lindell
Monograph, Springer Information Security and Cryptography Series 2010  [bibtex]
Table of Contents:
Part I: Introduction and Definitions
- Introduction 
- The GMW Protocol for Secure Computation
 - A Roadmap to the Book
 
 - Definitions 
- Preliminaries
 - Security in the Presence of Semi-honest Adversaries
 - Security in the Presence of Malicious Adversaries 
- The Definition
 - Extension to Reactive Functionalities
 - Malicious Versus Semi-honest Adversaries
 
 - Security in the Presence of Covert Adversaries 
- Motivation
 - The Actual Definition
 - Cheating and Aborting
 - Relations Between Security Models
 
 - Restricted Versus General Functionalities 
- Deterministic Functionalities
 - Single-Output Functionalities
 - Non-reactive Functionalities
 
 - Non-simulation-Based Definitions 
- Privacy Only
 - One-Sided Simulatability
 
 - Sequential Composition -- Simulation-Based Definitions
 
 
Part II: General Constructions
- Semi-honest Adversaries 
- An Overview of the Protocol
 - Tools 
- "Special" Private-Key Encryption
 - Oblivious Transfer
 
 - The Garbled-Circuit Construction
 - Efficiency of the Protocol
 
 - Malicious Adversaries 
- An Overview of the Protocol 
- High-Level Protocol Description
 - Checks for Correctness and Consistency
 
 - The Protocol
 - Proof of Security 
- Security Against a Malicious 
⚠ {$P_1$} - Security Against a Malicious 
⚠ {$P_2$} 
 - Security Against a Malicious 
 - Efficient Implementation of the Different Primitives
 - Efficiency of the Protocol
 - Suggestions for Further Reading
 
 - An Overview of the Protocol 
 - Covert Adversaries 
- Oblivious Transfer 
- The Basic Protocol
 - Extensions
 
 - Secure Two-Party Computation 
- Overview of the Protocol
 - The Protocol for Two-Party Computation
 - Non-halting Detection Accuracy
 
 - Efficiency of the Protocol
 
 - Oblivious Transfer 
 
Part III: Specific Constructions
- Sigma Protocols and Efficient Zero-Knowledge
- An Example
 - Definitions and Properties
 - Proofs of Knowledge
 - Proving Compound Statements
 - Zero-Knowledge from 
⚠ {$\Sigma$}-Protocols- The Basic Zero-Knowledge Construction
 - Zero-Knowledge Proofs of Knowledge
 - The ZKPOK Ideal Functionality
 
 - Efficient Commitment Schemes from 
⚠ {$\Sigma$}-Protocols - Summary
 
 - Oblivious Transfer and Applications 
- Notational Conventions for Protocols 
- A Protocol Based on the DDH Assumption
 - A Protocol from Homomorphic Encryption
 
 - Oblivious Transfer -- One-sided Simulation
 - Oblivious Transfer -- Full Simulation
- 1-out-of-2 Oblivious Transfer
 - Batch Oblivious Transfer
 
 - Another Oblivious Transfer -- Full Simulation
 - Secure Pseudorandom Function Evaluation 
- Pseudorandom Function -- Privacy Only
 - Pseudorandom Function -- Full Simulation
 - Covert and One-Sided Simulation
 - Batch Pseudorandom Function Evaluation
 
 
 - Notational Conventions for Protocols 
 - The kth-Ranked Element 
- Background 
- A Protocol for Finding the Median
 - Reducing the kth-Ranked Element to the Median
 
 - Computing the Median -- Semi-honest
 - Computing the Median -- Malicious
- The Reactive Greater-Than Functionality
 - The Protocol
 
 
 - Background 
 - Search Problems 
- Background
 - Secure Database Search 
- Securely Realizing Basic Database Search
 - Securely Realizing Full Database Search
 - Covert and One-Sided Simulation
 
 - Secure Document Search
 - Implementing Functionality 
⚠ {$\mathcal F_{CPRP}$}with Smartcards- Standard Smartcard Functionality and Security
 - Implementing 
⚠ {$\mathcal F_{CPRP}$}with Smartcards 
 - Secure Text Search (Pattern Matching)
- Indexed Implementation for Naor-Reingold
 - The Protocol for Secure Text Search
 
 
 
More information, taken from Preface:
Prerequisite knowledge. We assume that the reader is familiar with the basics of theoretical cryptography. Thus, for example, we assume that readers know what commitment schemes and zero-knowledge proofs are, and that they are comfortable with notions like pseudorandomness and computational indistinguishability. In contrast, all the relevant definitions of secure two-party computation are presented here from scratch. Thus, this book can also be used as a first introduction to secure computation.
Other
Comments & Errata from authors
Categories:
- Home page
 - All papers, by:
- .. category
 - .. author names
 - .. publication date
 - .. recently added
 - .. recently updated
 
 - Glossary
 - About
 - Just getting started in MPC?
 - Guidelines
 - Todo List
 
Search Papers
Bibliography Categories
