Secure Computation On The Web: Computing Without Simultaneous Interaction

CRYPTO'11: Proceedings of the 31st annual conference on Advances in cryptology(2011)

引用 113|浏览87
暂无评分
摘要
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. However, its use in practice seems limited. We argue that one of the reasons for this is that the model of computation on the web is not suited to the type of communication patterns needed for secure computation. Specifically, in most web scenarios clients independently connect to servers, interact with them and then leave. This rules out the use of secure computation protocols that require that all participants interact simultaneously.We initiate a study of secure computation in a client-server model where each client connects to the server once and interacts with it, without any other client necessarily being connected at the same time. We point out some inherent limitations in this model and present definitions that capture what can be done. We also present a general feasibility result and several truly practical protocols for a number of functions of interest. All our protocols are based on standard assumptions, and we achieve security both in the semi-honest and malicious adversary models.
更多
查看译文
关键词
secure computation,secure computation protocol,client-server model,malicious adversary model,present definition,strong security guarantee,web scenarios client,communication pattern,general feasibility result,inherent limitation,simultaneous interaction
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要