期刊文献+

Symmetric cryptographic protocols for extended millionaires’ problem 被引量:8

Symmetric cryptographic protocols for extended millionaires’ problem
原文传递
导出
摘要 Yao’s millionaires’ problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions.Unfortunately, most protocols for millionaires’ problem are constructed based on public cryptography, and thus are inefficient.Furthermore, all protocols are designed to solve the basic millionaires’ problem, that is, to privately determine which of two natural numbers is greater.If the numbers are real, existing solutions do not directly work.These features limit the extensive application of the existing protocols.This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires’ problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires’ problem, and proposes corresponding protocols.We further prove, by a well accepted simulation paradigm, that these protocols are private.Constructed based on symmetric cryptography, these protocols are very efficient. Yao’s millionaires’ problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions.Unfortunately, most protocols for millionaires’ problem are constructed based on public cryptography, and thus are inefficient.Furthermore, all protocols are designed to solve the basic millionaires’ problem, that is, to privately determine which of two natural numbers is greater.If the numbers are real, existing solutions do not directly work.These features limit the extensive application of the existing protocols.This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires’ problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires’ problem, and proposes corresponding protocols.We further prove, by a well accepted simulation paradigm, that these protocols are private.Constructed based on symmetric cryptography, these protocols are very efficient.
出处 《Science in China(Series F)》 2009年第6期974-982,共9页 中国科学(F辑英文版)
基金 Supported by the National Natural Science Foundation of China (Grant Nos 60673065, 60873249)
关键词 CRYPTOGRAPHY secure multiparty computation extended millionaires’ problem symmetric cryptography simulation paradigm cryptography secure multiparty computation extended millionaires’ problem symmetric cryptography simulation paradigm
  • 相关文献

参考文献3

二级参考文献30

  • 1Wenliang Du, Mikhail J Atallah. Secure multi-partycomputation problems and their applications: A reviewand open problems. In New Security Paradigms Work-shop 2001,September 11-13, 2001, Cloudcroft, NewMexico,USA., pp.11-20. Available at http://www.cis.syr.edu/ wedu/Research/publication.ht ml.
  • 2Mikhail J Atallah, Wenliang Du. Secure multi-party compu-tational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179.
  • 3Yao A. Protocols for secure computations. In Proc. the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA., 1982,pp.160-164.
  • 4Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Conference on Theory of Computing, ACM Press, New York, 1987,pp.218-229.
  • 5Goldwasser S. Multi-party computations: Past and present.In Proc. the 16th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, 1997, pp.21-24.
  • 6Lindell Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cwptology, 2003, 16(3):143-184.
  • 7Goldreich O. Secure multi-party computation (working draft).Available at http://www.wisdom.weizmann.ac.il/home/oded/publichtml/foc.html, 2002.
  • 8Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
  • 9Rakesh Agrawal, Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. the PO00 ACM SIGMOD on Management of Data, ACM Press, New York. 2000. pp.439-450.
  • 10Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996,39(5): 77-85.

共引文献77

同被引文献30

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部