• DocumentCode
    3263237
  • Title

    Scalar-product based secure two-party computation

  • Author

    Shen, Chih-Hao ; Zhan, Justin ; Hsu, Tsan-Sheng ; Liau, Churn-Jung ; Wang, Da-Wei

  • Author_Institution
    Heinz Sch., Carnegie Mellon Univ., Pittsburgh, PA
  • fYear
    2008
  • fDate
    26-28 Aug. 2008
  • Firstpage
    556
  • Lastpage
    561
  • Abstract
    Secure multiparty computation is a very important research topic in cryptography. The sub-problem of secure multiparty computation that has received special attention by researchers because of its close relation to many cryptographic tasks is secure two-party computation. This area of research is concerned with the question: ldquoCan two party computation be achieved more efficiently and under weaker security assumptions than general multiparty computation?rdquo Yaopsilas protocol provided security against passive adversaries, while Lindell and Pinkas proposed secure two party protocols that are secure against active adversaries. In this paper, we would like to propose a set of information theoretically secure protocols based on scalar product protocol. The detailed complexity analysis is also provided.
  • Keywords
    cryptography; protocols; Yao protocol; cryptography; secure multiparty computation; secure two-party computation; Councils; Cryptographic protocols; Cryptography; Data privacy; Information science; Information security; Information theory; International collaboration; National security; Proposals;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Granular Computing, 2008. GrC 2008. IEEE International Conference on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4244-2512-9
  • Electronic_ISBN
    978-1-4244-2513-6
  • Type

    conf

  • DOI
    10.1109/GRC.2008.4664775
  • Filename
    4664775