Efficient Secure Computation from SM Series Cryptography

نویسندگان

چکیده

The wireless network suffers from many security problems, and computation in a environment may fail to preserve privacy as well correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure ensures execution such an environment, compared with on plaintext, performance of secure is bounded by underlying cryptographic algorithms between involved parties. Besides, Chinese cryptography laws require that appeared commercial market be authorized. In this work, we show how implement oblivious transfer (OT), important primitive multiparty (MPC), using government-approved SM2 SM3 algorithms. algorithm based elliptic curve much faster than discrete logarithm-based solutions. Moreover, adopting standard OT extension technique, can extend number OTs efficiently one more round communication invocations SM4 used Beaver multiplication triple generation other MPC protocols, e.g., private set intersection. Therefore, utilize SM series cryptography, specifically, SM2, SM3, algorithms, build highly efficient frameworks which are suitable for applications China. experimental evaluation results our protocols have comparable existing protocols; quite bad environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Cryptography for the Next Generation Secure

of “Efficient Cryptography for the Next Generation Secure Cloud” by Alptekin Küpçü, Ph.D., Brown University, May 2010. Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security ...

متن کامل

Broadcast-Efficient Secure Multiparty Computation

Secure multiparty computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known which tolerate a dishonest minori...

متن کامل

Efficient Non-interactive Secure Computation

Suppose that a receiver R wishes to publish an encryption of her secret input x so that every sender S, holding an input y, can reveal f(x, y) to R by sending her a single message. This should be done while simultaneously protecting the secrecy of y against a corrupted R and preventing a corrupted S from having an unfair influence on the output of R beyond what is allowed by f . When the partie...

متن کامل

Efficient Secure Multi-party Computation

Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...

متن کامل

MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions

One of the main tools to construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based protocols with security against malicious adversaries. At TCC 2009, Nielsen and Orlandi [28] suggested to apply cut-andchoose at the gate level, while previously cut-and-choose was applied on the circuit as a whole. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2023

ISSN: ['1530-8669', '1530-8677']

DOI: https://doi.org/10.1155/2023/6039034