Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations

4Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study the problem of secure function evaluation in the so called commodity based cryptography model as proposed by Beaver in his STOC 97 paper. We propose very efficient protocols for implementing addition and multiplication over GF(q). Differently than in previous works, in our protocol each step of the computation is verifiable. Moreover, no copying of commitments is necessary, because commitments are not destroyed during the computation. Also, no error correcting techniques are necessary here yielding simpler protocols. The protocol is based on novel verifiable primitives (one time multiplication proofs, multiplication gates and pre-distributed commitments) in the commodity based model which allow two players to perform secure multiplication of shares over GF(q) with round-complexity equal to one. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Nascimento, A. C. A., Mueller-Quade, J., Otsuka, A., Hanaoka, G., & Imai, H. (2003). Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2851, 151–164. https://doi.org/10.1007/10958513_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free