The Arithmetic Codex: Theory and Applications

نویسنده

  • Ronald Cramer
چکیده

We define the notion of an arithmetic codex (or codex, for short), and as a special case, arithmetic secret sharing. This notion encompasses as well as generalizes, in a single mathematical framework, all known types of specialized secret sharing schemes from the area of secure multi-party computation, i.e., the so-called (strongly) multiplicative linear secret sharing schemes. These schemes were first studied as an abstract primitive by Cramer, Damg̊ard, and Maurer in the late 1990s. They showed that the “Fundamental Theorem of Information-Theoretically Secure Multi-Party Computation,” the landmark 1988 result by Ben-Or, Goldwasser, and Wigderson and, independently at the same time by Chaum, Crépeau, Damg̊ard, admits a proof that uses this primitive as a blackbox: it is possible to bootstrap, in a blackbox fashion, from this primitive a set of atomic subprotocols upon which general secure computation can be based. They also showed when and how multiplicative schemes (but not strongly multiplicative ones) reduce to ordinary ones and gave applications to security against non-threshold adversaries. In 2006, Chen and Cramer showed an “asymptotically good” version of the Fundamental Theorem, where the size of the network is unbounded and where an adversary corrupts a constant fraction of the network, yet the information rate of the secret sharing primitive is constant. Their result relies on a careful choice of algebraic geometric codes, in combination with the earlier work of Cramer, Damg̊ard, and Maurer. In 2007 this asymptotic result turned out to have a surprising application in two-party cryptography, through the work of Ishai, Kushilevitz, Ostrovsky and Sahai (“Multi-Party Computation in the Head”). This first application was to zero knowledge for circuit satisfiability, but soon after other applications to secure two-party computation and information theory (correlation extractors) followed. Our notion of arithmetic secret sharing is not merely a unification for its own sake. First, it casts these schemes in terms of a dedicated “representation” of K-algebras, thereby bringing the relevant mathematical structure to the surface. Second, it identifies novel types of special secret sharing schemes. And, third, there are novel cryptographic applications. Besides presenting some elementary examples and giving an overview of the basic theory and the main applications, we discuss a construction of arithmetic secret sharing schemes based on a novel algebraic-geometric paradigm that we also introduce. This talk is mainly based on several recent joint works with Nacho Cascudo (CWI) and Chaoping Xing (NTU). But in part it is also based on recent joint work with Ivan Damg̊ard (Aarhus University) and Valerio Pastro (Aarhus University).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Arithmetic Teichmuller Theory

By Grothedieck's Anabelian conjectures, Galois representations landing in outer automorphism group of the algebraic fundamental group which are associated to hyperbolic smooth curves defined over number fields encode all arithmetic information of these curves. The goal of this paper is to develope and arithmetic teichmuller theory, by which we mean, introducing arithmetic objects summarizing th...

متن کامل

A Note on the First Geometric-Arithmetic Index of Hexagonal Systems and Phenylenes

The first geometric-arithmetic index was introduced in the chemical theory as the summation of 2 du dv /(du  dv ) overall edges of the graph, where du stand for the degree of the vertex u. In this paper we give the expressions for computing the first geometric-arithmetic index of hexagonal systems and phenylenes and present new method for describing hexagonal system by corresponding a simple g...

متن کامل

Arithmetic Deformation Theory of Lie Algebras

This paper is devoted to deformation theory of graded Lie algebras over Z or Zl with finite dimensional graded pieces. Such deformation problems naturally appear in number theory. In the first part of the paper, we use Schlessinger criteria for functors on Artinian local rings in order to obtain universal deformation rings for deformations of graded Lie algebras and their graded representations...

متن کامل

Variance analysis of control variate technique and applications in Asian option ‎pricing‎

This paper presents an analytical view of variance reduction by control variate technique for pricing arithmetic Asian options as a financial derivatives. In this paper, the effect of correlation between two random variables is shown. We propose an efficient method for choose suitable control in pricing arithmetic Asian options based on the control variates (CV). The numerical experiment shows ...

متن کامل

Derived fuzzy importance of attributes based on the weakest triangular norm-based fuzzy arithmetic and applications to the hotel services

The correlation between the performance of attributes and the overallsatisfaction such as they are perceived by the customers is often used tocalculate the importance of attributes in the crisp case. Recently, the methodwas extended, based on the standard Zadeh extension principle, to the fuzzycase, taking into account the specificity of the human thinking. Thedifficulties of calculation are im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011