Efficient Secure Computation from SM Series Cryptography
نویسندگان
چکیده
The wireless network suffers from many security problems, and computation in a environment may fail to preserve privacy as well correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure ensures execution such an environment, compared with on plaintext, performance of secure is bounded by underlying cryptographic algorithms between involved parties. Besides, Chinese cryptography laws require that appeared commercial market be authorized. In this work, we show how implement oblivious transfer (OT), important primitive multiparty (MPC), using government-approved SM2 SM3 algorithms. algorithm based elliptic curve much faster than discrete logarithm-based solutions. Moreover, adopting standard OT extension technique, can extend number OTs efficiently one more round communication invocations SM4 used Beaver multiplication triple generation other MPC protocols, e.g., private set intersection. Therefore, utilize SM series cryptography, specifically, SM2, SM3, algorithms, build highly efficient frameworks which are suitable for applications China. experimental evaluation results our protocols have comparable existing protocols; quite bad environments.
منابع مشابه
Efficient Cryptography for the Next Generation Secure
of “Efficient Cryptography for the Next Generation Secure Cloud” by Alptekin Küpçü, Ph.D., Brown University, May 2010. Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security ...
متن کاملBroadcast-Efficient Secure Multiparty Computation
Secure multiparty computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known which tolerate a dishonest minori...
متن کاملEfficient Non-interactive Secure Computation
Suppose that a receiver R wishes to publish an encryption of her secret input x so that every sender S, holding an input y, can reveal f(x, y) to R by sending her a single message. This should be done while simultaneously protecting the secrecy of y against a corrupted R and preventing a corrupted S from having an unfair influence on the output of R beyond what is allowed by f . When the partie...
متن کاملEfficient Secure Multi-party Computation
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...
متن کاملMiniLEGO: Efficient Secure Two-Party Computation from General Assumptions
One of the main tools to construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based protocols with security against malicious adversaries. At TCC 2009, Nielsen and Orlandi [28] suggested to apply cut-andchoose at the gate level, while previously cut-and-choose was applied on the circuit as a whole. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2023
ISSN: ['1530-8669', '1530-8677']
DOI: https://doi.org/10.1155/2023/6039034