Private simultaneous messages protocols with applications

被引:79
|
作者
Ishai, Y
Kushilevitz, E
机构
关键词
D O I
10.1109/ISTCS.1997.595170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the Private Simultaneous Messages (PSM) model which if a variant of the model proposed in [16]. fn the PSM model there are n players P-1,... P-n, each player P-i holding a secret input x(i) (say, a bit), and all having access to a common random string. Each player sends a single message to a special player; Carol, depending on its own input and the random string land independently of all other messages). Based on these messages, Carol should be able to compute f(x(1),..., x(n)) (for some predetermined function fl but should learn no additional information on the values of x(1)..., x(n). Our results go in two directions, First, we present efficient PSM protocols, which improve the efficiency of previous solutions, and extend their scope to several function classes for which no such solutions were known before. These classes include most of the important linear algebraic functions; as a result, we get efficient constant-round private pro standard model)for these classes. Second, we present reductions that allow transforming PSM protocols into solutions for some other problems, thereby demonstrating the power of this model. An interesting reduction of this sort shows how to construct, based on a standard (2/1)-OT (Oblivious Transfer) primitive, generalized-OT (GOT) primitives that, we believe, might be useful for the design of cryptographic protocols.
引用
收藏
页码:174 / 183
页数:10
相关论文
共 50 条
  • [41] Simultaneous encryption and authentication of messages over GPUs
    Fanfakh, Ahmed
    Noura, Hassan
    Couturier, Raphael
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4757 - 4789
  • [42] The Deterministic Capacity of Relay Networks with Relay Private Messages
    Zewail, Ahmed A.
    Mohasseb, Y.
    Nafie, M.
    El Gamal, H.
    [J]. 2013 IEEE INFORMATION THEORY WORKSHOP (ITW), 2013,
  • [43] Hiding Numerical Vectors in Local Private and Shuffled Messages
    Wang, Shaowei
    Li, Jin
    Qian, Yuqiu
    Du, Jiachun
    Lin, Wenqing
    Yang, Wei
    [J]. PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 3706 - 3712
  • [44] "Act natural!": Exchanging Private Messages on Public Blockchains
    Tiemann, Thore
    Berndt, Sebastian
    Eisenbarth, Thomas
    Liskiewicz, Maciej
    [J]. 2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 292 - 308
  • [45] Automatic Generation of Authentication Questions from Private Messages
    Li, Ming
    Tajima, Keishi
    [J]. 2015 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY (WI-IAT), VOL 1, 2015, : 505 - 510
  • [46] Plant volatiles carry both public and private messages
    Gershenzon, Jonathan
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2007, 104 (13) : 5257 - 5258
  • [47] Private and social language in the messages of monolingual and bilingual children
    Boada, H
    Forns, M
    [J]. INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2004, 39 (5-6) : 103 - 103
  • [48] Resources for Controlled Languages for Alert Messages and Protocols in the European Perspective
    Cardey, Sylviane
    Bogacki, Krzysztof
    Blanco, Xavier
    Mitkov, Ruslan
    [J]. LREC 2010 - SEVENTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2010,
  • [49] Packing messages as a tool for boosting the performance of total ordering protocols
    Friedman, R
    vanRenesse, R
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 1997, : 233 - 242
  • [50] An efficient algorithm for removing useless logged messages in SBML protocols
    Ahn, J
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 166 - 171