Title :
Scalar-product based secure two-party computation
Author :
Shen, Chih-Hao ; Zhan, Justin ; Hsu, Tsan-Sheng ; Liau, Churn-Jung ; Wang, Da-Wei
Author_Institution :
Heinz Sch., Carnegie Mellon Univ., Pittsburgh, PA
Abstract :
Secure multiparty computation is a very important research topic in cryptography. The sub-problem of secure multiparty computation that has received special attention by researchers because of its close relation to many cryptographic tasks is secure two-party computation. This area of research is concerned with the question: ldquoCan two party computation be achieved more efficiently and under weaker security assumptions than general multiparty computation?rdquo Yaopsilas protocol provided security against passive adversaries, while Lindell and Pinkas proposed secure two party protocols that are secure against active adversaries. In this paper, we would like to propose a set of information theoretically secure protocols based on scalar product protocol. The detailed complexity analysis is also provided.
Keywords :
cryptography; protocols; Yao protocol; cryptography; secure multiparty computation; secure two-party computation; Councils; Cryptographic protocols; Cryptography; Data privacy; Information science; Information security; Information theory; International collaboration; National security; Proposals;
Conference_Titel :
Granular Computing, 2008. GrC 2008. IEEE International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4244-2512-9
Electronic_ISBN :
978-1-4244-2513-6
DOI :
10.1109/GRC.2008.4664775