Secure multiparty computations using the 15 puzzle (Extended abstract)

被引:0
作者
Mizuki, Takaaki [1 ]
Kugimoto, Yoshinori [2 ,3 ]
Sone, Hideaki [1 ]
机构
[1] Tohoku Univ, Aoba Ku, Infomat Synergy Ctr, Aramaki Aza Aoba 6-3, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Infomat Synergy Ctr, Aoba Ku, Sendai, Miyagi 9808578, Japan
[3] Tohoku Univ, Grad Sch Informat Sci, Sone Lab, Sendai, Miyagi, Japan
来源
COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS | 2007年 / 4616卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper first considers the use of the "15 puzzle," which is one of the most famous sliding-block puzzles, to provide secure multiparty computations. That is, we design a class of 15-puzzle-based protocols for securely computing Boolean functions. Specifically, we show that any function of 4 variables (or less) and any symmetric function of 14 variables (or less) can be securely computed by a 15-puzzle-based protocol; furthermore, we present a 5-variable function and a 15-variable symmetric function, both of which cannot be securely computed by any protocol in the class.
引用
收藏
页码:255 / +
页数:2
相关论文
共 50 条
[31]   Intrusion-resilient secure channels (Extended abstract) [J].
Itkis, G ;
McNerney, R ;
Russell, S .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 :238-253
[32]   New constructions for secure hash functions (Extended abstract) [J].
Aiello, W ;
Haber, S ;
Venkatesan, R .
FAST SOFTWARE ENCRYPTION, 1998, 1372 :150-167
[33]   Secure Implementations of Typed Channel Abstractions (Extended Abstract) [J].
Bugliesi, Michele ;
Giunti, Marco .
CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, 2007, :251-262
[34]   Separating deterministic from nondeterministic NOF multiparty communication complexity - (Extended abstract) [J].
Beame, Paul ;
David, Matei ;
Pitassi, Toniann ;
Woelfel, Philipp .
AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2007, 4596 :134-+
[35]   Extended Abstract: Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor [J].
Kim, Yu Seung .
2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
[36]   Fast and scalable parallel matrix computations with optical buses (extended abstract) [J].
Li, KQ .
PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 :1053-1062
[37]   Statistical analysis methods using secure multiparty computation [J].
Kamm, Liina ;
Bogdanov, Dan ;
Pankova, Alisa ;
Talviste, Riivo .
Cryptology and Information Security Series, 2015, 13 :58-80
[38]   Using Secure Multiparty Computation for Collaborative Information Exchange [J].
Titze, Dennis ;
Hofinger, Hans ;
Schoo, Peter .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :1717-1722
[39]   One-round secure computation and secure autonomous mobile agents (Extended abstract) [J].
Cachin, C ;
Camenisch, J ;
Kilian, J ;
Müller, J .
AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 :512-523
[40]   Protocols for collusion-secure asymmetric fingerprinting (extended abstract) [J].
Biehl, I ;
Meyer, B .
STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 :399-412