Secure Circuit Evaluation a Protocol Based on Hiding Information from an Oracle
نویسنده
چکیده
We present a simple protocol for two-player secure circuit evaluation. The protocol enables players C and D to cooperate in the computation of f(x) while D conceals her data x from C and C conceals his circuit for f from D. The protocol is based on the technique of hiding information from an oracle [Abadi, Feigenbaum, Kilian, J. Comput. System Sci. 39(1):21{50, August, 1989].
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملPractical Secure Function Evaluation
This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably secure against semi-honest adversaries in the random oracle model is given. Furthermore, the extension of SFE to private functions (PF-SFE) using universal circuits is considered. Based on a new practical universal circui...
متن کاملEecient Private Bidding and Auctions with an Oblivious Third Party
We describe a novel and eecient protocol for the following problem: A wants to buy some good from B if the price is less than a. B would like to sell, but only for more than b, and neither of them wants to reveal the secret bounds. Will the deal take place? Our solution uses an oblivious third party T who learns no information about a or b, not even whether a > b. The protocol needs only a sing...
متن کاملA traceable optimistic fair exchange protocol in the standard model
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...
متن کاملTwo-Party Attribute-based Key Agreement Protocol in the Standard Model
We present a new two-party attribute-based key agreement protocol that is secure without the random oracle model in groups equipped with a bilinear map. The attribute-based key agreement scheme is one type of the identity-based key agreement scheme, in which the identity can be viewed as a set of descriptive attributes. These kinds of schemes provide some new properties, such as hiding the iden...
متن کامل