Title :
Non-interactive cryptocomputing for NC1
Author :
Sander, Tomas ; Young, Adam ; Yung, Moti
Author_Institution :
Int. Comput. Sci. Inst., Berkeley, CA, USA
Abstract :
The area of “computing with encrypted data” has been studied by numerous authors in the past twenty years since it is fundamental to understanding properties of encryption and it has many practical applications. The related fundamental area of “secure function evaluation” has been studied since the mid 80´s. In its basic two-party case, two parties (Alice and Bob) evaluate a known circuit over private inputs (or a private input and a private circuit). Much attention has been paid to the important issue of minimizing rounds of computation in this model. Namely, the number of communication rounds in which Alice and Bob need to engage in to evaluate a circuit on encrypted data securely. Advancements in these areas have been recognized as open problems and have remained open for a number of years. In this paper we give a one round, and thus round optimal, protocol for secure evaluation of circuits which is in polynomial time for NC1 circuits. The protocol involves an input party sending encrypted input to a second party, a cryptocomputer, which evaluates the circuit (or a known circuit over its additional private input) non-interactively, securely and obliviously, and provides the output to the input party without learning it. This improves on previous (general) results that are specialized to the case of NC1 circuits and require a constant number of communication rounds. We further suggest applications to network and mobile computing
Keywords :
cryptography; mobile computing; NC1; NC1 circuits; communication rounds; cryptocomputer; encrypted input; encryption; input party; mobile computing; network computing; noninteractive cryptocomputing; one round protocol; polynomial time; round optimal protocol; secure circuit evaluation; secure function evaluation; Circuits; Computer networks; Computer science; Polynomials; Protocols; Public key; Public key cryptography;
Conference_Titel :
Foundations of Computer Science, 1999. 40th Annual Symposium on
Conference_Location :
New York City, NY
Print_ISBN :
0-7695-0409-4
DOI :
10.1109/SFFCS.1999.814630