高级检索
    赵川, 徐俊. 基于Cut-and-Choose技术的安全多方计算[J]. 计算机研究与发展, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    引用本文: 赵川, 徐俊. 基于Cut-and-Choose技术的安全多方计算[J]. 计算机研究与发展, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    Citation: Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664

    基于Cut-and-Choose技术的安全多方计算

    Secure Multi-Party Computation Based on Cut-and-Choose Technology

    • 摘要: Cut-and-Choose技术是密码学中一种被广泛使用的密码学工具,对安全多方计算协议的设计起着重要的作用.其主要思想是一方在协议中构造多份混淆电路,另一方要求打开其中一部分电路进行检查,若检查通过则计算剩余的电路,决定电路的最终输出.在早期工作中,Cut-and-Choose技术主要应用于恶意模型下的安全两方计算,并由此产生了许多优秀的工作.尽管该技术在隐蔽安全模型中的工作也很早提出,但在当时并没有引起太多的关注.近年来,随着学者对于隐蔽敌手的深入研究,Cut-and-Choose技术以及基于该技术的思想也开始被用于实现公开可验证的隐蔽安全协议,涌现出一些代表性的工作.首先介绍了Cut-and-Choose技术在恶意安全模型和隐蔽安全模型中的研究进展;其次重点介绍其应用于公开可验证隐蔽安全模型中的研究成果;最后通过对该领域的研究成果进行详细的总结与分析,并指出后续可能的发展方向.

       

      Abstract: Cut-and-Choose is a widely used technique in cryptography, which plays an important role in the design of secure multi-party computation (MPC) protocols. The main idea of Cut-and-Choose is that one party constructs multiple copies of the objective garbled circuit, and the other party randomly chooses some of the circuits to be opened for correctness check. If the check passes, the parties evaluate the remaining circuits and determine the final output of the computation task. In the early research works, Cut-and-Choose was mainly used in MPC in malicious model, and a lot of excellent research results were proposed. Although this technology was also applied in the covert security model, it did not attract much attention at that time. In recent years, with in-depth research on covert adversaries, Cut-and-Choose technique and ideas based on this technique have also been used to obtain publicly verifiable covert secure MPC protocols. Some representative research works have emerged. In this work, we summarize the main research advance of Cut-and-Choose in malicious security model and covert security model, and present the achievements of this technology in the publicly verifiable covert security model. We make a detailed summary and analysis of relevant results in this research field and point out possible research directions in the future.

       

    /

    返回文章
    返回