Oblivious polynomial evaluation

被引:4
|
作者
Li, HD [1 ]
Ji, DY [1 ]
Feng, DG [1 ]
Li, B [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
关键词
oblivious polynomial evaluation; oblivious transfer; secure multi-party computation; information security;
D O I
10.1007/BF02944757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomial P(x) and the other party (Bob) with an input x wants to learn P(x) in such an oblivious way that Bob obtains P(x) without learning any additional information about P except what is implied by P(x) and Alice does not know Bob's input x. The former OPE protocols are based on an intractability assumption except for OT protocols. In fact, evaluating P(x) is equivalent to computing the product of the coefficient vectors (a(0),...,a(n)) and (1,...,x(n)). Using this idea, an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol. Compared with the existing OPE protocol, another characteristic of the proposed protocols is the degree of the polynomial is private. Another OPE protocol works in case of existence of untrusted third party. Keywords oblivious polynomial evaluation, oblivious transfer, secure multi-party computation, information.
引用
收藏
页码:550 / 554
页数:5
相关论文
共 50 条
  • [41] Oblivious DFA evaluation on joint input and its applications
    Zhao, Chuan
    Zhao, Shengnan
    Zhang, Bo
    Jing, Shan
    Chen, Zhenxiang
    Zhao, Minghao
    INFORMATION SCIENCES, 2020, 528 (528) : 168 - 180
  • [42] Cache-oblivious computation: Algorithms and experimental evaluation
    Ramachandran, Vijaya
    ICCTA 2007: INTERNATIONAL CONFERENCE ON COMPUTING: THEORY AND APPLICATIONS, PROCEEDINGS, 2007, : 20 - 25
  • [43] Two-Message, Oblivious Evaluation of Cryptographic Functionalities
    Doettling, Nico
    Fleischhacker, Nils
    Krupp, Johannes
    Schroeder, Dominique
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 619 - 648
  • [44] Oblivious Infinite Derivable Function Evaluation and Its Application
    Pang Shuting
    Tang Chunming
    Hao Zhifeng
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 92 - 95
  • [45] Two-Party Oblivious DFA Evaluation Protocol
    Khachatryan, Gurgen
    Hovsepyan, Mihran
    Jivanyan, Aram
    MEETING SECURITY CHALLENGES THROUGH DATA ANALYTICS AND DECISION SUPPORT, 2016, 47 : 276 - 286
  • [46] General Two-Party Oblivious Circuit Evaluation
    Faraj, Sufyan T.
    2006 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2007, : 210 - 213
  • [47] AN EVALUATION OF A LINK POLYNOMIAL
    LIPSON, AS
    MATHEMATICAL PROCEEDINGS OF THE CAMBRIDGE PHILOSOPHICAL SOCIETY, 1986, 100 : 361 - 364
  • [48] POLYNOMIAL EVALUATION SCHEMES
    NEWBERY, ACR
    MATHEMATICS OF COMPUTATION, 1975, 29 (132) : 1046 - 1050
  • [49] ON THE EVALUATION OF A MATRIX POLYNOMIAL
    ROY, SCD
    MINOCHA, S
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 1992, 39 (07): : 567 - 570
  • [50] EVALUATION OF A MATRIX POLYNOMIAL
    FATH, AF
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1968, AC13 (02) : 220 - &