DocumentCode :
517349
Title :
Efficient Round-Optimal Secure Two-Party Computation from Sigma-protocol
Author :
Tang, Yonglong ; Tang, Chunming
Author_Institution :
Sch. of Inf. Adm. & Eng., Jishou Univ., Jishou, China
Volume :
1
fYear :
2010
fDate :
12-14 April 2010
Firstpage :
26
Lastpage :
30
Abstract :
In this paper, based on Σ-protocol on HC (a NP-complete language), we firstly construct a Σ-protocol for any NP language thm1 ∧ thm2, then transfer it into a non-interactive protocol from a hash function and a pseudo-random generator. Finally, we construct an efficient round-optimal secure two-party computation protocol from our non-interactive protocols.
Keywords :
cryptographic protocols; optimisation; Σ-protocol; NP language thm1 ∧ thm2; NP-complete language; noninteractive protocol; round-optimal secure two-party computation protocol; Cost function; Cryptographic protocols; Cryptography; Information science; Information security; Laboratories; Mathematics; Mobile communication; Mobile computing; Secure computation; round-optimal secure two-party computation $/sum$-protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Mobile Computing (CMC), 2010 International Conference on
Conference_Location :
Shenzhen
Print_ISBN :
978-1-4244-6327-5
Electronic_ISBN :
978-1-4244-6328-2
Type :
conf
DOI :
10.1109/CMC.2010.280
Filename :
5471389
Link To Document :
بازگشت