Secure games with polynomial expressions

16Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR protocol is symmetrically secure, and improves by a few orders of magnitude the known probabilistically correct poly-logarithmic scheme. This result is achieved as an application of our methodology which introduces a broad family of games, called Secure Games with Polynomial Expressions (SGPEs), that involve two interacting players: Alice and Bob. The objective of these games is the secure interactive computation of the value of a polynomial expression which is made up of polynomials and field elements that both players distributedly contribute to the game. The players wish to keep some or all the data (field elements and polynomials) they contribute to the game, secret and independently secure. We show that any SGPE can be played much more effciently than by using generic methods, and so that no party reveals more than what it intends to. Besides the above mentioned PIR application, we present additional applications such as the lists' intersection predicate which is useful for secure conduct of e-commerce procedures, such as negotiation methods known as settlement escrows in the legal/economics/business literature. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kiayias, A., & Yung, M. (2001). Secure games with polynomial expressions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2076 LNCS, pp. 939–950). Springer Verlag. https://doi.org/10.1007/3-540-48224-5_76

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free