Secure evaluation of polynomial using privacy ring homomorphisms

نویسندگان

  • Alexander Rostovtsev
  • Alexey Bogdanov
  • Mikhail Mikhaylov
چکیده

Method of secure evaluation of polynomial y = F(x1, ..., xk) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active. In passive model untrusted computer correctly computes polynomial F and tries to know secret input (x1, ..., xk) and output y. In active model untrusted computer tries to know input and output and tries to change correct output y so that this change cannot be determined. Secure computation is proposed by using one-time privacy ring homomorphism /n → /n[z]/(f(z)), n = pq, generated by trusted computer. In the case of active model secret check point v = F(u1, ..., uk) is used. Trusted computer generates polynomial f(z) = (z − t)(z + t), t ∈ /n and input Xi(z) ∈ /n[z]/(f(z)) such that Xi(t) ≡ xi (mod n) for passive model, and f(z) = (z − t1)(z − t2)(z − t3), ti ∈ /n and input Xi(z) ∈ /n[z]/(f(z)) such that Xi(t1) ≡ xi (mod n), Xi(t2) ≡ ui (mod n) for active model. Untrusted computer computes function Y(z) = F(X1(z), ..., Xk(z)) in the ring /n[z]/(f(z)). For passive model trusted computer determines secret output y ≡ Y(t) (mod n). For active model trusted computer checks that Y(t2) ≡ v (mod n), then determines correct output y ≡ Y(t1) (mod n).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ideal of Lattice homomorphisms corresponding to the products of two arbitrary lattices and the lattice [2]

Abstract. Let L and M be two finite lattices. The ideal J(L,M) is a monomial ideal in a specific polynomial ring and whose minimal monomial generators correspond to lattice homomorphisms ϕ: L→M. This ideal is called the ideal of lattice homomorphism. In this paper, we study J(L,M) in the case that L is the product of two lattices L_1 and L_2 and M is the chain [2]. We first characterize the set...

متن کامل

Ring structures of mod p equivariant cohomology rings and ring homomorphisms between them

In this paper, we consider a class of connected oriented (with respect to Z/p) closed G-manifolds with a non-empty finite fixed point set, each of which is G-equivariantly formal, where G = Z/p and p is an odd prime. Using localization theorem and equivariant index, we give an explicit description of the mod p equivariant cohomology ring of such a G-manifold in terms of algebra. This makes ...

متن کامل

Multi-Application Smart Cards and Encrypted Data Processing

Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement —or rather bottleneck— that all confidential data and processing be supported by the card. Our approach is based on running some applications outside the...

متن کامل

Multi-Application Smart Cards and Encrypted Data Processing

Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement| or rather bottleneck|that all con ̄dential data and processing be supported by the card. Our approach is based on running some applications outside the c...

متن کامل

Multi-application smart cards and processing*

Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement-or rather the bottleneck-that all confidential data and processing be supported by the card. Our approach is based on running some applications outside t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011