Oblivious polynomial evaluation

被引:4
|
作者
Li, HD [1 ]
Ji, DY [1 ]
Feng, DG [1 ]
Li, B [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
关键词
oblivious polynomial evaluation; oblivious transfer; secure multi-party computation; information security;
D O I
10.1007/BF02944757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomial P(x) and the other party (Bob) with an input x wants to learn P(x) in such an oblivious way that Bob obtains P(x) without learning any additional information about P except what is implied by P(x) and Alice does not know Bob's input x. The former OPE protocols are based on an intractability assumption except for OT protocols. In fact, evaluating P(x) is equivalent to computing the product of the coefficient vectors (a(0),...,a(n)) and (1,...,x(n)). Using this idea, an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol. Compared with the existing OPE protocol, another characteristic of the proposed protocols is the degree of the polynomial is private. Another OPE protocol works in case of existence of untrusted third party. Keywords oblivious polynomial evaluation, oblivious transfer, secure multi-party computation, information.
引用
收藏
页码:550 / 554
页数:5
相关论文
共 50 条
  • [31] Oblivious Sketching of High-Degree Polynomial Kernels
    Ahle, Thomas D.
    Kapralov, Michael
    Knudsen, Jakob B. T.
    Pagh, Rasmus
    Velingker, Ameya
    Woodruff, David P.
    Zandieh, Amir
    PROCEEDINGS OF THE 2020 ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, SODA, 2020, : 141 - 160
  • [32] The head hierarchy for oblivious finite automata with polynomial advice collapses
    Petersen, H
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 1998, 1998, 1450 : 296 - 304
  • [33] Oblivious evaluation of multivariate polynomials
    Tassa, Tamir
    Jarrous, Ayman
    Ben-Ya'akov, Yonatan
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (01) : 1 - 29
  • [34] Oblivious decision program evaluation
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    IET INFORMATION SECURITY, 2013, 7 (02) : 155 - 163
  • [35] Feasibility of Polynomial-Time Randomized Gathering for Oblivious Mobile Robots
    Izumi, Taisuke
    Izumi, Tomoko
    Kamei, Sayaka
    Ooshita, Fukuhito
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (04) : 716 - 723
  • [36] Oblivious RAM: A Dissection and Experimental Evaluation
    Chang, Zhao
    Xie, Dong
    Li, Feifei
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2016, 9 (12): : 1113 - 1124
  • [37] Distributed oblivious function evaluation and its applications
    Li, HD
    Yang, X
    Feng, DG
    Li, B
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 942 - 947
  • [38] Quantum Universally Composable Oblivious Linear Evaluation
    Santos, Manuel B.
    Mateus, Paulo
    Vlachou, Chrysoula
    QUANTUM, 2024, 8 : 1 - 42
  • [39] Distributed oblivious function evaluation and its applications
    Hong-Da Li
    Xiong Yang
    Deng-Guo Feng
    Bao Li
    Journal of Computer Science and Technology, 2004, 19 : 942 - 947
  • [40] An Efficient Protocol for Oblivious DFA Evaluation and Applications
    Mohassel, Payman
    Niksefat, Salman
    Sadeghian, Saeed
    Sadeghiyan, Babak
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 398 - +