Secure computation without computers

被引:8
|
作者
D'Arco, Paolo [1 ]
De Prisco, Roberto [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, Via Giovanni Paolo 2, I-84084 Fisciano, SA, Italy
关键词
Yao's construction; Visual cryptography; Secure computation; CRYPTOGRAPHY; ENCRYPTION;
D O I
10.1016/j.tcs.2016.08.003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer. In this paper we make a step in such a direction: we propose a novel method for performing secure two-party computations that, apart from the setup phase, requires neither a computing machinery nor cryptographic knowledge. By merging together in a suitable way two beautiful ideas of the 80's and the 90's, Yao's garbled circuit construction and Naor and Shamir's visual cryptography, respectively, we enable Alice and Bob to securely evaluate a function f (.,.) of their inputs, x and y, through a pure physical process. Indeed, once Alice has prepared a set of properly constructed transparencies (for this activity a computer is useful), Bob computes the function value f (x, y) by applying a sequence of simple steps which require the use of a pair of scissors, superposing transparencies, and the human visual system. Our construction builds on Kolesnikov's gate evaluation secret sharing schemes. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:11 / 36
页数:26
相关论文
共 50 条
  • [1] Secure Computation Without Authentication
    Boaz Barak
    Ran Canetti
    Yehuda Lindell
    Rafael Pass
    Tal Rabin
    [J]. Journal of Cryptology, 2011, 24 : 720 - 760
  • [2] Secure computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. DISTRIBUTED COMPUTING, PROCEEDINGS, 2002, 2508 : 17 - 32
  • [3] Secure computation without authentication
    Barak, B
    Canetti, R
    Lindell, Y
    Pass, R
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 361 - 377
  • [4] Secure Computation Without Authentication
    Barak, Boaz
    Canetti, Ran
    Lindell, Yehuda
    Pass, Rafael
    Rabin, Tal
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 720 - 760
  • [5] Secure multiparty computations without computers
    Niemi, V
    Renvall, A
    [J]. THEORETICAL COMPUTER SCIENCE, 1998, 191 (1-2) : 173 - 183
  • [6] Characterization of Secure Multiparty Computation Without Broadcast
    Cohen, Ran
    Haitner, Iftach
    Omri, Eran
    Rotem, Lior
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 596 - 616
  • [7] Four Round Secure Computation Without Setup
    Brakerski, Zvika
    Halevi, Shai
    Polychroniadou, Antigoni
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 645 - 677
  • [8] Characterization of Secure Multiparty Computation Without Broadcast
    Ran Cohen
    Iftach Haitner
    Eran Omri
    Lior Rotem
    [J]. Journal of Cryptology, 2018, 31 : 587 - 609
  • [9] Characterization of Secure Multiparty Computation Without Broadcast
    Cohen, Ran
    Haitner, Iftach
    Omri, Eran
    Rotem, Lior
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (02) : 587 - 609
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287