### Abhi Shelat

Dept. of Computer Science

University of Virginia

Charlottesville, VA

USA

## Secure two-party computation

#### Abstract

Secure two-party computation allows Alice with private input
*x* and Bob, with input *y*, to jointly compute *f(x,y)*
without revealing any information other than the output
*f(x,y)*.

We will introduce Yao's garbled circuits framework for constructing such secure two-party protocols. We will start with an overview of the basic honest-but-curious protocol, which guarantees that when Alice and Bob both follow the protocol, they learn nothing more than the output. We will introduce the oblivious transfer protocol and the basic garbling methods for circuits. We will also discuss all recent algorithmic improvements to garbling, including garbled row-reduction, free xor, secret-sharing, and half-gate garbling.

We then describe the cut-and-choose paradigm for transforming an
honest-but-curious protocol into a maliciously-secure protocol. We
will consider several approaches to the cut-and-choose technique,
starting with the SS13 protocol. We will then highlight the recent
technique of Lindell13 that achieves security *2 ^{-s}*
but only requires roughly

*s*garbled circuits. This course will serve as a basic introduction to practical secure 2-party computation in both honest-but-curious and malicious models.

#### Course materials

- A. Shelat. Secure two-party computation. Slides from the EWSCS 2015 course. [pdf]
- Videos from the lectures.
- Y. Lindell, B. Pinkas. An efficient protocol for secure two-party
computation in the presence of malicious adversaries. In M. Naor, ed.,
*Proc. of 26th Ann. Int. Conf. on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007*, v. 4515 of*Lect. Notes in Comput. Sci.*, pp. 52-78. Springer, 2007. [doi link] - Y. Lindell, B. Pinkas. Secure two-party computation via
cut-and-choose oblivious transfer.
*J. of Cryptol.*, v. 25, n. 4, pp. 680-722, 2012. [doi link] - A. Shelat, C.-H. Shen. Two-output secure computation with
malicious adversaries. In K. G. Paterson, ed.,
*Proc. of 30th Ann. Int. Conf. on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011*, v. 6632 of*Lect. Notes in Comput. Sci.*, pp. 386-405. Springer, 2011. [doi link] - B. Kreuter, A. Shelat, C.-H. Shen. Billion-gate secure computation
with malicious adversaries. In
*Proc. of 21th USENIX Security Symp.*, pp. 285-300. USENIX, 2012. [copy on USENIX website] - A. Shelat, C.-H. Shen. Fast two-party secure computation with
minimal assumptions. In
*Proc. of 2013 ACM SIGSAC Conf. on Computer & Communications Security, CCS '13*, pp. 523-534. ACM, 2013. [doi link] - Y. Lindell. Fast cut-and-choose based protocols for malicious and
covert adversaries. In R. Canetti, Y. A. Garay, eds.,
*Proc. of 33rd Ann. Cryptology Conf., CRYPTO 2013, Part II*, v. 8043 of*Lect. Notes in Comput. Sci.*, pp. 1-17. Springer, 2013. [doi link]

Last changed **
April 17, 2016 21:46 Europe/Helsinki (GMT +03:00)**
by
local organizers, ewscs15(at)cs.ioc.ee

EWSCS'15 page:
//cs.ioc.ee/ewscs/2015/