Secure multiparty computation of DNF

被引:0
作者
Peng, Kun
机构
来源
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS | 2007年 / 4681卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphism based multiparty computation techniques are studied in this paper as they have several advantages over the other multiparty computation schemes. A new homomorphism based multiparty computation technique is proposed to evaluate functions in DNF form. The new technique exploits homomorphism of a certain sealing function to evaluate a function in DNF. The new technique has two advantages over the existing homomorphism based multiparty computation schemes. Firstly, it supports any input format. Secondly, a general method to reduce any function to DNFs is proposed in this paper. With this method, functions like the famous millionaire problem can be reduced to DNFs and efficiently evaluated. Security of the new scheme is formally defined in the static active adversary model and proved in a new simulation model.
引用
收藏
页码:254 / 268
页数:15
相关论文
共 28 条
  • [1] [Anonymous], LNCS
  • [2] Beaver D, 2000, LECT NOTES COMPUT SC, V1807, P335
  • [3] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P113, DOI 10.1145/62212.62223
  • [4] Cachin C, 2000, LECT NOTES COMPUT SC, V1880, P93
  • [5] CANETTI R, FOCS 2001, P136
  • [6] CANETTI R, ACM STOC 1996, P143
  • [7] CHAUM D, STOC 1988, P11
  • [8] Cramer R, 2001, LECT NOTES COMPUT SC, V2045, P280
  • [9] Cramer R, 1999, LECT NOTES COMPUT SC, V1592, P311
  • [10] Damgård I, 2005, LECT NOTES COMPUT SC, V3621, P378