Security with Low Communication Overhead

نویسندگان

  • Donald Beaver
  • Joan Feigenbaum
  • Joe Kilian
  • Phillip Rogaway
چکیده

We consider the communication complexity of secure multiparty computations by networks of processors each with unlimited computing power. Say that an n-party protocol for a function of m bits is efficient if it uses a constant number of rounds of communication and a total number of message bits that is polynomial in max(m, n). We show that any function has an efficient protocol that achieves (rclog n)/m resilience. Ours is the first secure multiparty protocol in which the communication complexity is independent of the computational complexity of the function being computed. We also consider the communication complexity of zero-knowledge proofs of properties of committed bits. We show that every function / of m bits has an efficient notarized envelope scheme; that is, there is a protocol in which a computationally unlimited prover commits a sequence of bits x to a computationally unlimited verifier and then proves in perfect zero-knowledge (without decommitting x) that f(x) = 1, using a constant number of rounds and poly(m) message bits. Ours is the first notarized envelope scheme in which the communication complexity is independent of the computational complexity of / . Finally, we establish a new upper bound on the number of oracles needed in instance-hiding schemes for arbitrary functions. These schemes allow a computationally limited querier to capitalize on the superior power of one or more computationally unlimited oracles in order to obtain f(x) without revealing its private input x to any one of the oracles. We show that every function of m bits has an (m/logm)-oracle instance-hiding scheme. The central technique used in all of these results is locally random reducibility, which was used for the first time in [7] and is formally defined for the first time here. In addition to the applications that we present, locally random reducibility has been applied to interactive proof systems, program checking, and program testing. •AT&T Bell Laboratories, Room 2C324, 600 Mountain Avenue, Murray Hill, NJ 07974 USA, [email protected]. Work done at Harvard University, supported in part by NSF grant CCR870-4513. AT&T Bell Laboratories, Room 2C473, 600 Mountain Avenue, Murray Hill, NJ 07974 USA, jf@research. att .com. * Harvard University and MIT Laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139 USA, [email protected],mit.edu. Supported by an NSF Postdoctoral Fellowship. 5 MIT Laboratory for Computer Science, 545 Technology Square, C a m MA 02139 USA, bridge,MA02139USA,[email protected]. A.J. Menezes and S.A. Vanstone (Eds.): Advances in Cryptology CRYPTO '90, LNCS 537, pp. 62-76, 1991. © Springer-Verlag Berlin Heidelberg 1991

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Efficient Certificateless Online/Offline Signature with tight security

Since public key cryptography is usually build using computationally expensive operation, it has been out of reach for resource constrained and low power devices. Today there are a large number of low power devices in use and they perform complex tasks. There is need for light weight cryptography having high security and low communication overhead. Online/Offline schemes are well suited for thi...

متن کامل

Transient Analysis of the Single-Conductor Overhead Lines Connected to Grid-Grounded Arrester under Direct Lightning by Means of GA

In this paper, genetic algorithm-based approach for transient analysis of single transmission line connected to arrester is proposed. In this approach, the lightning channel striking the overhead line is first represented by a current source and this source is truncated by a finite set of frequency harmonies in time domain. Norton equivalent circuit viewed across arrester is then computed by me...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

we propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security pro...

متن کامل

An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key manageme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990