Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

被引:0
|
作者
Rafael Tonicelli
Anderson C. A. Nascimento
Rafael Dowsley
Jörn Müller-Quade
Hideki Imai
Goichiro Hanaoka
Akira Otsuka
机构
[1] University of Brasilia,Department of Electrical Engineering
[2] Karlsruhe Institute of Technology,Institute of Theoretical Informatics
[3] National Institute of Advanced Industrial Science and Technology (AIST),undefined
关键词
Information-theoretic cryptography; Cryptographic primitives; Oblivious polynomial evaluation; Commodity-based model;
D O I
暂无
中图分类号
学科分类号
摘要
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial p(x)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x)$$\end{document} and a receiver inputs a single value x0\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$x_{0}$$\end{document}. At the end of the protocol, the sender learns nothing and the receiver learns p(x0)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p(x_{0})$$\end{document}. This paper deals with the problem of oblivious polynomial evaluation under an information-theoretic perspective, which is based on the definitions of unconditional security developed by Crépeau et al. (Information-theoretic conditions for two-party secure function evaluation. EUROCRYPT 2006, LNCS 4004. Springer, Berlin, Heidelberg, pp 538–554, 2006). In this paper, we propose an information-theoretic model for oblivious polynomial evaluation relying on pre-distributed data and prove very general lower bounds on the size of the pre-distributed data, as well as the size of the communications in any protocol. It is demonstrated that these bounds are tight by obtaining a round-optimal OPE protocol, which meets the lower bounds simultaneously. We present a natural generalization to OPE called oblivious linear functional evaluation.
引用
收藏
页码:73 / 84
页数:11
相关论文
共 50 条
  • [31] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10
  • [32] Information-theoretically secure key insulated encryption: Models, bounds and constructions
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (10) : 2521 - 2532
  • [33] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
    Seito, Takenobu
    Aikawa, Tadashi
    Shikata, Junji
    Matsumoto, Tsutomu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
  • [34] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
  • [35] Information-Theoretically Secure Multi-Party Linear Regression and Logistic Regression
    Zhou, Hengcheng
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 192 - 199
  • [36] Unconditionally Secure Distributed Oblivious Polynomial Evaluation
    Cianciullo, Louis
    Ghodosi, Hossein
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 132 - 142
  • [37] Unconditionally secure Oblivious Polynomial Evaluation protocol
    Li Luyao
    Duan Zongtao
    Wang Qinglong
    Wang Jing
    Dai Ming
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION, 2013, 33 : 579 - 583
  • [38] Security research on an information-theoretically secure secret key agreement using LDPC matrices
    Yu, Jia
    Luo, Yuan
    Li, Minglu
    PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201
  • [39] Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption
    Hu, Yanglin
    Ouyang, Yingkai
    Tomamichel, Marco
    QUANTUM, 2023, 7
  • [40] A Novel Unconditionally Secure Oblivious Polynomial Evaluation Protocol
    Vanishree, H.
    George, Koshy
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 450 - 452