Title :
Secure Dot-product Protocol Using Trace Functions
Author :
Malek, Behzad ; Miri, Ali
Author_Institution :
Sch. of Inf. Technol. & Eng., Ottawa Univ., Ont.
Abstract :
In a secure dot-product protocol, two parties jointly compute the dot-product of two vectors of their inputs. In our protocol, the result of a secure dot-product is known only to one party while each input in known only to its owner. This protocol is the first non-interactive secure dot-product protocol that only requires one round of interaction with O(n) communication overhead, where n is the size of the input vectors. The computation overhead of this scheme is negligible as it requires few integer multiplications and additions. In our construction, the sender and the receiver are information theoretically secure over sets E and S* respectively, where E and S* are subsets of the vector space. In our protocol, the security of the sender and the receiver can be increased by choosing large fields
Keywords :
cryptography; protocols; communication overhead; receiver; secure dot-product protocol; trace functions; Cryptographic protocols; Cryptography; Data security; Equations; Galois fields; Information security; Information technology; Polynomials; Statistical analysis; Vectors;
Conference_Titel :
Information Theory, 2006 IEEE International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
1-4244-0505-X
Electronic_ISBN :
1-4244-0504-1
DOI :
10.1109/ISIT.2006.261795