Skip to main content

Automatic generation of two-party computations

Publication ,  Conference
MacKenzie, P; Oprea, A; Reiter, MK
Published in: Proceedings of the ACM Conference on Computer and Communications Security
January 1, 2003

We present the design and implementation of a compiler that automatically generates protocols that perform two-party computations. The input to our protocol is the specification of a computation with secret inputs (e.g., a signature algorithm) expressed using operations in the field ℤq of integers modulo a prime q and in the multiplicative subgroup of order q in ℤp* for q|p -1 with generator g. The output of our compiler is an implementation of each party in a two-party protocol to perform the same computation securely, i.e., so that both parties can together compute the function but neither can alone. The protocols generated by our compiler are provably secure, in that their strength can be reduced to that of the original cryptographic computation via simulation arguments. Our compiler can be applied to various cryptographic primitives (e.g., signature schemes, encryption schemes, oblivious transfer protocols) and other protocols that employ a trusted party (e.g., key retrieval, key distribution). Copyright 2003 ACM.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2003

Start / End Page

210 / 219
 

Citation

APA
Chicago
ICMJE
MLA
NLM
MacKenzie, P., Oprea, A., & Reiter, M. K. (2003). Automatic generation of two-party computations. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 210–219). https://doi.org/10.1145/948138.948139
MacKenzie, P., A. Oprea, and M. K. Reiter. “Automatic generation of two-party computations.” In Proceedings of the ACM Conference on Computer and Communications Security, 210–19, 2003. https://doi.org/10.1145/948138.948139.
MacKenzie P, Oprea A, Reiter MK. Automatic generation of two-party computations. In: Proceedings of the ACM Conference on Computer and Communications Security. 2003. p. 210–9.
MacKenzie, P., et al. “Automatic generation of two-party computations.” Proceedings of the ACM Conference on Computer and Communications Security, 2003, pp. 210–19. Scopus, doi:10.1145/948138.948139.
MacKenzie P, Oprea A, Reiter MK. Automatic generation of two-party computations. Proceedings of the ACM Conference on Computer and Communications Security. 2003. p. 210–219.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

January 1, 2003

Start / End Page

210 / 219