An information-theoretic approach for secure protocol composition

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach would be utilizing basic protocols as building blocks for the construction of complex protocol. In this paper, we proposed the concept of t-certified protocols, which are protocols that are secure when t parties are under the influence of a semi-honest adversary. A composition theorem is given to specify the conditions for secure composition of t-certified protocols, and a framework for constructing complex protocols is developed. We have adopted an information theoretical approach, and believe that it will be a viable alternative to the classic simulator approach, which is based on the concept of indistinguishability between the ideal model and the real model.

Cite

CITATION STYLE

APA

Chiang, Y. T., Hsu, T. S., Liau, C. J., Liu, Y. C., Shen, C. H., Wang, D. W., & Zhan, J. (2015). An information-theoretic approach for secure protocol composition. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 152, pp. 405–423). Springer Verlag. https://doi.org/10.1007/978-3-319-23829-6_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free