Secure evaluation of polynomial using privacy ring homomorphisms
نویسندگان
چکیده
Method of secure evaluation of polynomial y = F(x1, ..., xk) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active. In passive model untrusted computer correctly computes polynomial F and tries to know secret input (x1, ..., xk) and output y. In active model untrusted computer tries to know input and output and tries to change correct output y so that this change cannot be determined. Secure computation is proposed by using one-time privacy ring homomorphism /n → /n[z]/(f(z)), n = pq, generated by trusted computer. In the case of active model secret check point v = F(u1, ..., uk) is used. Trusted computer generates polynomial f(z) = (z − t)(z + t), t ∈ /n and input Xi(z) ∈ /n[z]/(f(z)) such that Xi(t) ≡ xi (mod n) for passive model, and f(z) = (z − t1)(z − t2)(z − t3), ti ∈ /n and input Xi(z) ∈ /n[z]/(f(z)) such that Xi(t1) ≡ xi (mod n), Xi(t2) ≡ ui (mod n) for active model. Untrusted computer computes function Y(z) = F(X1(z), ..., Xk(z)) in the ring /n[z]/(f(z)). For passive model trusted computer determines secret output y ≡ Y(t) (mod n). For active model trusted computer checks that Y(t2) ≡ v (mod n), then determines correct output y ≡ Y(t1) (mod n).
منابع مشابه
Ideal of Lattice homomorphisms corresponding to the products of two arbitrary lattices and the lattice [2]
Abstract. Let L and M be two finite lattices. The ideal J(L,M) is a monomial ideal in a specific polynomial ring and whose minimal monomial generators correspond to lattice homomorphisms ϕ: L→M. This ideal is called the ideal of lattice homomorphism. In this paper, we study J(L,M) in the case that L is the product of two lattices L_1 and L_2 and M is the chain [2]. We first characterize the set...
متن کاملRing structures of mod p equivariant cohomology rings and ring homomorphisms between them
In this paper, we consider a class of connected oriented (with respect to Z/p) closed G-manifolds with a non-empty finite fixed point set, each of which is G-equivariantly formal, where G = Z/p and p is an odd prime. Using localization theorem and equivariant index, we give an explicit description of the mod p equivariant cohomology ring of such a G-manifold in terms of algebra. This makes ...
متن کاملMulti-Application Smart Cards and Encrypted Data Processing
Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement —or rather bottleneck— that all confidential data and processing be supported by the card. Our approach is based on running some applications outside the...
متن کاملMulti-Application Smart Cards and Encrypted Data Processing
Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement| or rather bottleneck|that all con ̄dential data and processing be supported by the card. Our approach is based on running some applications outside the c...
متن کاملMulti-application smart cards and processing*
Some existing approaches to multi-application smart card design rely on the card containing data and importing the code of functions (methods) to be performed on data. A complementary solution is proposed in this paper to relax the requirement-or rather the bottleneck-that all confidential data and processing be supported by the card. Our approach is based on running some applications outside t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011