Private simultaneous messages protocols with applications

被引:79
|
作者
Ishai, Y
Kushilevitz, E
机构
关键词
D O I
10.1109/ISTCS.1997.595170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the Private Simultaneous Messages (PSM) model which if a variant of the model proposed in [16]. fn the PSM model there are n players P-1,... P-n, each player P-i holding a secret input x(i) (say, a bit), and all having access to a common random string. Each player sends a single message to a special player; Carol, depending on its own input and the random string land independently of all other messages). Based on these messages, Carol should be able to compute f(x(1),..., x(n)) (for some predetermined function fl but should learn no additional information on the values of x(1)..., x(n). Our results go in two directions, First, we present efficient PSM protocols, which improve the efficiency of previous solutions, and extend their scope to several function classes for which no such solutions were known before. These classes include most of the important linear algebraic functions; as a result, we get efficient constant-round private pro standard model)for these classes. Second, we present reductions that allow transforming PSM protocols into solutions for some other problems, thereby demonstrating the power of this model. An interesting reduction of this sort shows how to construct, based on a standard (2/1)-OT (Oblivious Transfer) primitive, generalized-OT (GOT) primitives that, we believe, might be useful for the design of cryptographic protocols.
引用
收藏
页码:174 / 183
页数:10
相关论文
共 50 条
  • [21] Communication complexity of simultaneous messages
    Babai, L
    Gál, A
    Kimmel, PG
    Lokam, SV
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 33 (01) : 137 - 166
  • [22] Relaying Simultaneous Multicast Messages
    Gunduz, D.
    Simeone, O.
    Goldsmith, A.
    Poor, H. V.
    Shamai , S.
    [J]. ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, 2009, : 47 - +
  • [23] Emoji Recommendation in Private Instant Messages
    Guibon, Gael
    Ochs, Magalie
    Bellot, Patrice
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1821 - 1823
  • [24] Schemes for scheduling of control messages by hierarchical protocols
    Bortnikov, E
    Cohen, R
    [J]. IEEE INFOCOM '98 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS. 1-3: GATEWAY TO THE 21ST CENTURY, 1998, : 865 - 872
  • [25] Schemes for scheduling control messages by hierarchical protocols
    Bortnikov, E
    Cohen, R
    [J]. COMPUTER COMMUNICATIONS, 2001, 24 (7-8) : 731 - 743
  • [26] Private selective payment protocols
    Di Crescenzo, G
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 72 - 89
  • [27] APPLICATIONS AND PROTOCOLS
    KIMBLETON, SR
    WANG, P
    LAMPSON, BW
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1981, 105 : 308 - 370
  • [28] RESPONDING TO ONE OF 2 SIMULTANEOUS MESSAGES
    SPIETH, W
    CURTIS, JF
    WEBSTER, JC
    [J]. JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 1954, 26 (03): : 391 - 396
  • [29] Quantum Private Information Retrieval for Quantum Messages
    Song, Seunghoan
    Hayashi, Masahito
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 1052 - 1057
  • [30] PRIVATE SPEECH IN THE MESSAGES OF BILINGUAL AND MONOLINGUAL CHILDREN
    Martin Martinez, Conchi San
    Boada Calbet, Humbert
    Forns Santacana, Maria
    [J]. RLA-REVISTA DE LINGUISTICA TEORICA Y APLICADA, 2014, 52 (01): : 59 - 77