• DocumentCode
    517349
  • Title

    Efficient Round-Optimal Secure Two-Party Computation from Sigma-protocol

  • Author

    Tang, Yonglong ; Tang, Chunming

  • Author_Institution
    Sch. of Inf. Adm. & Eng., Jishou Univ., Jishou, China
  • Volume
    1
  • fYear
    2010
  • fDate
    12-14 April 2010
  • Firstpage
    26
  • Lastpage
    30
  • Abstract
    In this paper, based on Σ-protocol on HC (a NP-complete language), we firstly construct a Σ-protocol for any NP language thm1 ∧ thm2, then transfer it into a non-interactive protocol from a hash function and a pseudo-random generator. Finally, we construct an efficient round-optimal secure two-party computation protocol from our non-interactive protocols.
  • Keywords
    cryptographic protocols; optimisation; Σ-protocol; NP language thm1 ∧ thm2; NP-complete language; noninteractive protocol; round-optimal secure two-party computation protocol; Cost function; Cryptographic protocols; Cryptography; Information science; Information security; Laboratories; Mathematics; Mobile communication; Mobile computing; Secure computation; round-optimal secure two-party computation $/sum$-protocol;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Mobile Computing (CMC), 2010 International Conference on
  • Conference_Location
    Shenzhen
  • Print_ISBN
    978-1-4244-6327-5
  • Electronic_ISBN
    978-1-4244-6328-2
  • Type

    conf

  • DOI
    10.1109/CMC.2010.280
  • Filename
    5471389