In this paper, a new notion which we call oblivious scalar-product protocols is introduced and formalized. We then propose an efficient implementation of oblivions scalar-product protocols based on homomorphic cryptographic primitives (e.g., homomorphic encryptions and homomorphic commitments). Finally we show that our implementation is provably secure assuming that the underlying Fujisaki-Okamoto's commitment scheme is statistically hiding and computationally binding, and Paillier's encryption scheme is semantically secure in the common reference string model. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Zhu, H., & Bao, F. (2006). Oblivious scalar-product protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4058 LNCS, pp. 313–323). Springer Verlag. https://doi.org/10.1007/11780656_26
Mendeley helps you to discover research relevant for your work.