Title :
An Efficient and Unconditionally-Secure Oblivious Polynomial Evaluation Protocol
Author :
Bo, Yang ; Qinglong, Wang ; Yunfei, Cao
Author_Institution :
South China Agric. Univ., Guangzhou
Abstract :
As two-party protocols, most of the existing oblivious polynomial evaluation schemes use oblivious transfer to realize oblivious evaluation for polynomial, They are high in computation complexity, which blocks their practical application. In this paper, we propose an oblivious polynomial evaluation protocol, the protocol does not rely on any cryptographic assumption and is unconditionally-secure. Again, the protocol does not rely on any third party and involves only extremely simple computation. OPE protocols can find many applications, such as protocols for private comparison of data, for mutually authenticated key exchange based on (possibly weak) passwords, and for anonymous coupons, and can be used as the basic building block to achieve asymmetry in public-key traitor tracing schemes.
Keywords :
computational complexity; polynomials; protocols; telecommunication security; computation complexity; key exchange authentication; unconditionally-secure oblivious polynomial evaluation protocol; Circuits; Cryptographic protocols; Cryptography; Data privacy; Data security; Educational institutions; Galois fields; Laboratories; Polynomials; Public key;
Conference_Titel :
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3016-1
DOI :
10.1109/ISDPE.2007.60