Secure computation without computers

被引:8
作者
D'Arco, Paolo [1 ]
De Prisco, Roberto [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, Via Giovanni Paolo 2, I-84084 Fisciano, SA, Italy
关键词
Yao's construction; Visual cryptography; Secure computation; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1016/j.tcs.2016.08.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer. In this paper we make a step in such a direction: we propose a novel method for performing secure two-party computations that, apart from the setup phase, requires neither a computing machinery nor cryptographic knowledge. By merging together in a suitable way two beautiful ideas of the 80's and the 90's, Yao's garbled circuit construction and Naor and Shamir's visual cryptography, respectively, we enable Alice and Bob to securely evaluate a function f (.,.) of their inputs, x and y, through a pure physical process. Indeed, once Alice has prepared a set of properly constructed transparencies (for this activity a computer is useful), Bob computes the function value f (x, y) by applying a sequence of simple steps which require the use of a pair of scissors, superposing transparencies, and the human visual system. Our construction builds on Kolesnikov's gate evaluation secret sharing schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:11 / 36
页数:26
相关论文
共 50 条
  • [21] PERFECT SECURE COMPUTATION IN TWO ROUNDS
    Applebaum, Benny
    Brakerski, Zvika
    Tsabary, Rotem
    SIAM JOURNAL ON COMPUTING, 2021, 50 (01) : 68 - 97
  • [22] Fine-Grained Secure Computation
    Campanelli, Matteo
    Gennaro, Rosario
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 66 - 97
  • [23] Adaptively Secure Computation with Partial Erasures
    Hazay, Carmit
    Lindell, Yehuda
    Patra, Arpita
    PODC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2015, : 291 - 300
  • [24] Secure Intersection-sum Computation
    Li S.-D.
    Zhang K.-X.
    Yang C.
    Wang Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3343 - 3353
  • [25] SCORAM: Oblivious RAM for Secure Computation
    Wang, Xiao Shaun
    Huang, Yan
    Chan, T-H Hubert
    Shelat, Abhi
    Shi, Elaine
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 191 - 202
  • [26] DEMO: Secure Computation in Java']JavaScript
    Schroepfer, Axel
    Kerschbaum, Florian
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 849 - 851
  • [27] Cross-Domain Secure Computation
    Cho, Chongwon
    Garg, Sanjam
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 650 - 668
  • [28] Secure kNN Computation on Encrypted Databases
    Wong, W. K.
    Cheung, David W.
    Kao, Ben
    Mamoulis, Nikos
    ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 139 - 152
  • [29] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [30] Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 163 - 193