Minimal Complete Primitives for Secure Multi-Party Computation

被引:0
|
作者
Matthias Fitzi
Juan A. Garay
Ueli Maurer
Rafail Ostrovsky
机构
[1] Department of Computer Science,
[2] University of California,undefined
[3] Davis,undefined
[4] CA 95616,undefined
[5] Bell Labs – Lucent Technologies,undefined
[6] 600 Mountain Ave.,undefined
[7] Murray Hill,undefined
[8] NJ 07974,undefined
[9] Department of Computer Science,undefined
[10] ETH,undefined
[11] CH-8096 Zurich,undefined
[12] Telcordia Technologies Inc.,undefined
[13] 445 South Street,undefined
[14] Morristown,undefined
[15] NJ 07960-6438,undefined
来源
Journal of Cryptology | 2005年 / 18卷
关键词
Multi-party computation; Secure function evaluation; Unconditional security; Complete functions; Oblivious cast;
D O I
暂无
中图分类号
学科分类号
摘要
The study of minimal cryptographic primitives needed to implement secure computation among two or more players is a fundamental question in cryptography. The issue of complete primitives for the case of two players has been thoroughly studied. However, in the multi-party setting, when there are n > 2 players and t of them are corrupted, the question of what are the simplest complete primitives remained open for t ≥ n/3. (A primitive is called complete if any computation can be carried out by the players having access only to the primitive and local computation.) In this paper we consider this question, and introduce complete primitives of minimal cardinality for secure multi-party computation. The cardinality issue (number of players accessing the primitive) is essential in settings where primitives are implemented by some other means, and the simpler the primitive the easier it is to realize. We show that our primitives are complete and of minimal cardinality possible for most cases.
引用
收藏
页码:37 / 61
页数:24
相关论文
共 50 条
  • [1] Minimal complete primitives for secure multi-party computation
    Fitzi, M
    Garay, JA
    Maurer, U
    Ostrovsky, R
    JOURNAL OF CRYPTOLOGY, 2005, 18 (01) : 37 - 61
  • [2] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [3] From Input Private to Universally Composable Secure Multi-party Computation Primitives
    Bogdanov, Dan
    Laud, Peeter
    Laur, Sven
    Pullonen, Pille
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 184 - 198
  • [4] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [5] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [6] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [7] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [8] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [9] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [10] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287