首页> 外文期刊>International Journal of Information Security >Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
【24h】

Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

机译:基于商品的模型中的信息理论上安全的遗忘多项式评估

获取原文
获取原文并翻译 | 示例
           

摘要

Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial and a receiver inputs a single value . At the end of the protocol, the sender learns nothing and the receiver learns . This paper deals with the problem of oblivious polynomial evaluation under an information-theoretic perspective, which is based on the definitions of unconditional security developed by Cr,peau et al. (Information-theoretic conditions for two-party secure function evaluation. EUROCRYPT 2006, LNCS 4004. Springer, Berlin, Heidelberg, pp 538-554, 2006). In this paper, we propose an information-theoretic model for oblivious polynomial evaluation relying on pre-distributed data and prove very general lower bounds on the size of the pre-distributed data, as well as the size of the communications in any protocol. It is demonstrated that these bounds are tight by obtaining a round-optimal OPE protocol, which meets the lower bounds simultaneously. We present a natural generalization to OPE called oblivious linear functional evaluation.
机译:遗忘多项式评估(OPE)由两方协议组成,其中发送方输入多项式,而接收方输入单个值。在该协议的末尾,发送者什么都学不到,而接收者则学到。本文基于信息理论的观点,基于Cr,peau等人提出的无条件安全性的定义,处理了遗忘多项式评估的问题。 (用于两方安全功能评估的信息理论条件。EUROCRYPT2006,LNCS4004。Springer,柏林,海德堡,第538-554页,2006年)。在本文中,我们提出了一个信息理论模型,用于基于预分配数据的遗忘多项式评估,并证明了预分配数据大小以及任何协议中通信大小的一般下限。通过获得圆形​​最优OPE协议证明了这些边界是紧密的,该协议同时满足下边界。我们对OPE提出了一种自然的概括,称为遗忘线性功能评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号