An application of ESOP expressions to secure computations

被引:7
|
作者
Mizuki, Takaaki
Otagiri, Taro
Sone, Hideaki
机构
[1] Tohoku Univ, Informat Synergy Ctr, Aoba Ku, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Grad Sch Informat Sci, Sone Lab, Aoba Ku, Sendai, Miyagi 9808578, Japan
关键词
AND-EXOR expressions; minimization of ESOP expressions; secure computations; application to cryptography;
D O I
10.1142/S0218126607003605
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper gives an application of exclusive-or sum-of-products ( ESOP) expressions to designing cryptographic protocols. That is, this paper deals with secure computations in a minimal model, and gives a protocol which securely computes every function by means of the techniques of ESOP expressions. The communication complexity of our protocol is proportional to the size of an obtained multiple-valued-input ESOP expression. Since the historical research on minimizing ESOP expressions is now still active, our protocol will "automatically" turn to an efficient one as this research progresses. Thus, we hope that the existence of our cryptographic protocol would motivate further research on minimizing ESOP expressions.
引用
收藏
页码:191 / 198
页数:8
相关论文
共 50 条
  • [41] MrCrypt: Static Analysis for Secure Cloud Computations
    Tetali, Sai Deep
    Lesani, Mohsen
    Majumdar, Rupak
    Millstein, Todd
    ACM SIGPLAN NOTICES, 2013, 48 (10) : 271 - 286
  • [42] Distributed intrusion detection for secure consensus computations
    Pasqualetti, Fabio
    Bicchi, Antonio
    Bullo, Francesco
    PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 1778 - 1783
  • [43] Hybrid approach for secure mobile agent computations
    McDonald, J. Todd
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 38 - 53
  • [44] Improvement and applications of secure outsourcing of scientific computations
    Jianhua Yu
    Xueli Wang
    Wei Gao
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 763 - 772
  • [45] ON PARALLEL COMPUTATIONS OF EXPRESSIONS AND STRAIGHT-LINE PROGRAMS
    RYTTER, W
    COMPUTERS AND ARTIFICIAL INTELLIGENCE, 1990, 9 (05): : 427 - 439
  • [46] Achieving Secure and Differentially Private Computations in Multiparty Settings
    Acar, Abbas
    Celik, Z. Berkay
    Aksu, Hidayet
    Uluagac, A. Selcuk
    McDaniel, Patrick
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 49 - 59
  • [47] Privacy of trust in similarity estimation through secure computations
    Carbo, J
    Molina, JM
    Davila, J
    13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 498 - 502
  • [48] Secure Computations Through Checking Suits of Playing Cards
    Miyahara, Daiki
    Mizuki, Takaaki
    FRONTIERS OF ALGORITHMIC WISDOM, IJTCS-FAW 2022, 2022, 13461 : 110 - 128
  • [49] Secure multi-party computations of geometric intersections
    Li, Shundong
    Dai, Yiqi
    Wang, Daoshun
    Luo, Ping
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2007, 47 (10): : 1692 - 1695
  • [50] Secure computations on handheld devices with the help of an untrusted server
    Huang, JY
    Susilo, W
    Seberry, J
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 458 - 463