Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction

被引:0
作者
Gordon, S. Dov [1 ]
Malkin, Tal [2 ]
Rosulek, Mike [3 ]
Wee, Hoeteck [4 ]
机构
[1] Appl Commun Sci, Red Bank, NJ 07701 USA
[2] Columbia Univ, New York, NY 10027 USA
[3] Univ Montana, Missoula, MT 59812 USA
[4] George Washington Univ, Washington, DC 20052 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013 | 2013年 / 7881卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Halevi, Lindell, and Pinkas (CRYPTO 2011) recently proposed a model for secure computation that captures communication patterns that arise in many practical settings, such as secure computation on the web. In their model, each party interacts only once, with a single centralized server. Parties do not interact with each other; in fact, the parties need not even be online simultaneously. In this work we present a suite of new, simple and efficient protocols for secure computation in this "one-pass" model. We give protocols that obtain optimal privacy for the following general tasks: Evaluating any multivariate polynomial F(x(1), ..., x(n)) (modulo a large RSA modulus N), where the parties each hold an input xi. Evaluating any read once branching program over the parties' inputs. As a special case, these function classes include all previous functions for which an optimally private, one-pass computation was known, as well as many new functions, including variance and other statistical functions, string matching, second-price auctions, classification algorithms and some classes of finite automata and decision trees.
引用
收藏
页码:575 / 591
页数:17
相关论文
共 20 条
[1]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[2]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[3]   Universally composable protocols with relaxed set-up assumptions [J].
Barak, B ;
Canetti, R ;
Nielsen, JB ;
Pass, R .
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, :186-195
[4]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[5]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[6]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[7]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2729, P126
[8]  
Cramer R., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P174
[9]  
Damgard I., 2008, ERCIM NEWS, V2008
[10]  
Gentry C, 2010, LECT NOTES COMPUT SC, V6223, P155, DOI 10.1007/978-3-642-14623-7_9