Secure Computation from Random Error Correcting Codes
نویسندگان
چکیده
Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure computation is that security is maintained even in the presence of an adversary who corrupts a quorum of the processors and who exercises full, malicious control over them. One of the fundamental primitives at the heart of secure computation is secret-sharing. Typically, the required secret-sharing techniques build on Shamir’s scheme, which can be viewed as a cryptographic twist on the Reed-Solomon error correcting code. In this work we further the connections between secure computation and error correcting codes. We demonstrate that threshold secure computation in the secure channels model can be based on arbitrary codes. For a network of size n, we then show a reduction in communication for secure computation amounting to a multiplicative polylogarithmic factor (in n) compared to classical methods for small, e.g., constant size fields, while tolerating t < ( 1 2 − )n players to be corrupted, where > 0 can be arbitrarily small. For large networks this implies considerable savings in communication. Our results hold in the broadcast/negligible error model of Rabin and Ben-Or, and complement results from CRYPTO 2006 for the zero-error model of Ben-Or, Goldwasser and Wigderson (BGW). Our general theory can be extended so as to encompass those results from CRYPTO 2006 as well. We also present a new method for constructing high information rate ramp schemes based on arbitrary codes, and in particular we give a new construction based on algebraic geometry codes. 1 Hao Chen’s research has been supported by NSFC grants 10225106 and 90607005. 2 Ronald Cramer’s research has been partially supported by NWO VICI. 4 Robbert de Haan’s research has been partially funded by the Dutch BSIK/BRICKS project PDC1.
منابع مشابه
Microsoft Word - Burst-and-Random-Error-Code-Evaluation
Markov chains are a popular means to capture correlated random processes for characterization and analysis of error pattern or bursty traffic in data transmission. The performance evaluation of communication protocols based on Markov models is tractable with limited state space and often depends on efficient implementation. Simulation or other methods have to be adopted for system of higher com...
متن کاملBuilding one-time memories from isolated qubits
One-time memories (OTM’s) are a simple type of tamper-resistant cryptographic hardware, which can be used to implement many forms of secure computation, such as one-time programs. Here we investigate the possibility of building OTM’s using isolated qubits — qubits that can only be accessed using local operations and classical communication (LOCC). Isolated qubits can be implemented using curren...
متن کاملAn Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding
We show a simple and eecient construction of a pseudo-random generator based on the intractability of an NP-complete problem from the area of error-correcting codes. The generator is proved as secure as a hard instance of the syndrome decoding problem. Each application of the scheme generates a linear amount of bits in only quadratic computing time.
متن کاملCombinatorial Neural Codes from a Mathematical Coding Theory Perspective
Shannon's seminal 1948 work gave rise to two distinct areas of research: information theory and mathematical coding theory. While information theory has had a strong influence on theoretical neuroscience, ideas from mathematical coding theory have received considerably less attention. Here we take a new look at combinatorial neural codes from a mathematical coding theory perspective, examining ...
متن کاملSecure Data Compression and Error Correcting Codes for Networks and Cloud Storage
of “Secure Data Compression and Error Correcting Codes for Networks and Cloud Storage” by James Alan Kelley, Ph.D., Brown University, May 2015. We present several novel constructions—combining cryptography, error correcting codes (ECCs), and data compression—that find ready application in enhancing security and fault-tolerance in cloud storage. We demonstrate this by presenting a simple (yet no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007