Non–Interactive CryptoComputing for NC5

Non–Interactive CryptoComputing for NC5

ID:40086440

大小:156.16 KB

页数:13页

时间:2019-07-20

Non–Interactive CryptoComputing for NC5_第1页
Non–Interactive CryptoComputing for NC5_第2页
Non–Interactive CryptoComputing for NC5_第3页
Non–Interactive CryptoComputing for NC5_第4页
Non–Interactive CryptoComputing for NC5_第5页
资源描述:

《Non–Interactive CryptoComputing for NC5》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、Non±InteractiveCryptoComputingforNC1TomasSanderAdamYoungInternationalComputerScienceInstituteDepartmentofComputerScienceBerkeley,CA,USAColumbiaUniversitysander@icsi.berkeley.eduNewYork,NY,USAayoung@cs.columbia.eduMotiYungCertCoInc.NewYork,NY,USAmoti@cs.columbia.eduAb

2、stractinfact,needprobabilisticencryptionschemeswhicharerandomself-reducible).HomomorphicencryptionschemesTheareaofªcomputingwithencrypteddataºhasbeenarecloselyrelatedtoandusefulinsecurecircuitevalua-studiedbynumerousauthorsinthepasttwentyyearssincetion.Theyhavebeenas

3、sociatedwithcomputationswithen-itisfundamentaltounderstandingpropertiesofencryptioncrypteddata(aswellaswithmanyothercryptographicap-andithasmanypracticalapplications.Therelatedfunda-plications).Surprisingly,theknownhomomorphicschemesmentalareaofªsecurefunctionevaluat

4、ionºhasbeenstudiedhavebeenlimitedtoasmallnumberofalgebraicstructures,sincethemid80's.Initsbasictwo-partycase,twopartiese.g.alltheschemesweareawareofarehomomorphicover(AliceandBob)evaluateaknowncircuitoverprivatein-groups.Wealsogiveanewprovablysecurepublickeyputs(orap

5、rivateinputandaprivatecircuit).MuchattentionschemethatallowsthecomputationofthelogicalANDop-hasbeenpaidtotheimportantissueofminimizingroundsoferationusingencrypteddata.Thisschemeishomomorphiccomputationinthismodel.Namely,thenumberofcommu-overasemigroup(insteadofagrou

6、p)andthusalsoexpandsnicationroundsinwhichAliceandBobneedtoengageintherangeofalgebraicstructureswhichcanbeencryptedtoevaluateacircuitonencrypteddatasecurely.Advance-ªhomomorphicallyº.mentsintheseareashavebeenrecognizedasopenprob-lemsandhaveremainedopenforanumberofyear

7、s.Inthis1Introductionpaperwegiveaoneround,andthusroundoptimal,proto-colforsecureevaluationofcircuitswhichisinpolynomial-Westudythefollowingclassicalproblem:timefor1NCcircuits.TheprotocolinvolvesaninputpartyAlicehasaninputsendingencryptedinputtoasecondparty,acryptocom

8、puter,xandBobhascircuitC.AliceshouldlearnthevalueC(x)butnothingelseªsub-whichevaluatesthecircuit(oraknowncircuitoveritsad-stantialº

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。