Security models beyond the "standard" ones of semi-honest and malicious adversaries.


Category contains 5 papers:

[AL10] Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. J Cryptology 2010 [pdf] [bibtex]

Summary: Defines a new model of "covert security" in which honest parties are guaranteed to detect cheating parties with some specified probability. »

[AO12] Gilad Asharov, Claudio Orlandi. Calling Out Cheaters: Covert Security with Public Verifiability. ASIACRYPT 2012 [pdf] [bibtex]

Summary: Augments the covert model of security so that honest parties receive publicly verifiable proof of cheating. »

[HKE12] Yan Huang, Jonathan Katz, David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. S&P 2012 [pdf] [bibtex]

Summary: Provides a more detailed treatment of the dual-execution protocol of MF06 »

[MF06] Payman Mohassel, Matthew Franklin. Efficiency Tradeoffs for Malicious Two-Party Computation. PKC 2006 [pdf] [bibtex]

Summary: Introduces the dual-execution method for 2PC »

[MR13] Payman Mohassel, Ben Riva. Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. CRYPTO 2013 [pdf] [bibtex]

Summary: Several new techniques giving efficiency improvements to cut-and-choose mechanisms »