Abstract :
A two-party oblivious circuit evaluation (2P- OCE) protocol is a way for a party Alice owns a secret x and another party Bob owns a secret y to compute the value of an agreed upon function f(x,y), where f can be computed by a polynomial sized Boolean circuit. This is done in such a way that Alice learns nothing about y and Bob learns nothing about x, except for what can be inferred from one´s private input and the public value of f(x,y). This paper presents a general, correct, fair, honest, and maximum privacy 2P-OCE protocol that is based on a set of reductions to more simple cryptographic primitives. The protocol uses the primitives of one-out-of-two oblivious transfer (1-2-OT) and bit commitment (BC) as black boxes. Consequently, the protocol may be implemented with or without computational assumptions, depending on the type of 1-2-OT and BC used by participants.
Keywords :
cryptographic protocols; bit commitment; cryptographic primitives; multi-party computation; oblivious transfer; two-party oblivious circuit evaluation protocol; Circuit analysis computing; Cryptographic protocols; Cryptography; Educational institutions; Helium; Information retrieval; Information security; Polynomials; Privacy; Statistical analysis; Bit Commitment; Circuit Evaluation; Multi-Party Computation; Oblivious Transfer;