DocumentCode
3263237
Title
Scalar-product based secure two-party computation
Author
Shen, Chih-Hao ; Zhan, Justin ; Hsu, Tsan-Sheng ; Liau, Churn-Jung ; Wang, Da-Wei
Author_Institution
Heinz Sch., Carnegie Mellon Univ., Pittsburgh, PA
fYear
2008
fDate
26-28 Aug. 2008
Firstpage
556
Lastpage
561
Abstract
Secure multiparty computation is a very important research topic in cryptography. The sub-problem of secure multiparty computation that has received special attention by researchers because of its close relation to many cryptographic tasks is secure two-party computation. This area of research is concerned with the question: ldquoCan two party computation be achieved more efficiently and under weaker security assumptions than general multiparty computation?rdquo Yaopsilas protocol provided security against passive adversaries, while Lindell and Pinkas proposed secure two party protocols that are secure against active adversaries. In this paper, we would like to propose a set of information theoretically secure protocols based on scalar product protocol. The detailed complexity analysis is also provided.
Keywords
cryptography; protocols; Yao protocol; cryptography; secure multiparty computation; secure two-party computation; Councils; Cryptographic protocols; Cryptography; Data privacy; Information science; Information security; Information theory; International collaboration; National security; Proposals;
fLanguage
English
Publisher
ieee
Conference_Titel
Granular Computing, 2008. GrC 2008. IEEE International Conference on
Conference_Location
Hangzhou
Print_ISBN
978-1-4244-2512-9
Electronic_ISBN
978-1-4244-2513-6
Type
conf
DOI
10.1109/GRC.2008.4664775
Filename
4664775
Link To Document