期刊文献+

Distributed Oblivious Function Evaluation and Its Applications 被引量:2

Distributed oblivious function evaluation and its applications
原文传递
导出
摘要 This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. Keywords oblivious function evaluation - oblivious polynomial evaluation - secure multiparty computation - distributed - information security The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029.Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol.Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security.Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security.Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems. This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. Keywords oblivious function evaluation - oblivious polynomial evaluation - secure multiparty computation - distributed - information security The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029.Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol.Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security.Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security.Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期942-947,共6页 计算机科学技术学报(英文版)
基金 国家重点基础研究发展计划(973计划),国家自然科学基金
关键词 oblivious function evaluation oblivious polynomial evaluation secure multiparty computation DISTRIBUTED information security oblivious function evaluation oblivious polynomial evaluation secure multiparty computation distributed information security
  • 相关文献

参考文献21

  • 1Canetti R. Studies in multi-party computation and applications [Dissertation].ftp://theory.lcs.mit.edu/pub/ tcryptol/B03/thesis.ps.Z
  • 2Canetti R. Universally composable security: A new paradigm for cryptographic protocols. http://eprint.iacr.org/2000/067
  • 3Canetti R. Security and composition of multi-party cryptographic protocols. Journal of Cryptology, 2000,13(1): 143-202.
  • 4Canetti R, Feige U, Goldreich O, Naor M. Adaptively secure multi-party computation. In Proc. 28th ACM Symp. Theory of Computing, Philadelphia, Pennsylvania, 1996, pp.639-648.
  • 5Canetti R, Damgard I, Dziembowski S, Ishai Y, Malkin T. On adaptive vs. non-adaptive security of multiparty protocols. Advance in Cryptology-EUROCRYPT 2001,Birgit Pfitzmann (ed.), LNCS 2045, pp.262-279.
  • 6Hirt M, Maurer U. Player simulation and general adversary structures in perfect multiparty computation.Journal of Cryptology, 2000, 13(1): 31-60.
  • 7Hirt M, Maurer U. Robustness for free in unconditional multi-party computation. Advances in CryptologyCRYPTO'01, Springer-Verlag, 2001, LNCS 2139,pp.101-118.
  • 8Goldreich O. Secure multi-party computation (working draft), http://www.wisdom.weizmann.ac.il.
  • 9Cramer R, Damgard I. Multiparty computation, an introduction, http://www.daimi.au.dk/-ivan/CPT.html.
  • 10Fitzi M, Gisin N, Maure U et al. Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from sc.ratch. In Proceedings of Eurocrypt'02, Springer-Verlag, 2002, LNCS 2332, pp.482-501.

同被引文献11

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部