首页 > 最新文献

Secure Multi-Party Computation最新文献

英文 中文
Randomization Techniques for Secure Computation 安全计算的随机化技术
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-222
Y. Ishai
To what extent can a computation be made “simpler” by settling for computing a randomized encoding of the output? Originating from Yao’s seminal idea of garbled circuits, answers to this question have found applications in cryptography and elsewhere. We will survey the state of the art on different flavors of this question that are motivated by different problems in secure computation and correspond to different notions of simplicity.
通过计算输出的随机编码,在多大程度上可以使计算“更简单”?这个问题的答案已经在密码学和其他领域得到了应用,它起源于姚关于乱码电路的开创性思想。我们将调查这个问题的不同风格的艺术状态,这些问题是由安全计算中的不同问题引起的,并对应于不同的简单性概念。
{"title":"Randomization Techniques for Secure Computation","authors":"Y. Ishai","doi":"10.3233/978-1-61499-169-4-222","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-222","url":null,"abstract":"To what extent can a computation be made “simpler” by settling for computing a randomized encoding of the output? Originating from Yao’s seminal idea of garbled circuits, answers to this question have found applications in cryptography and elsewhere. We will survey the state of the art on different flavors of this question that are motivated by different problems in secure computation and correspond to different notions of simplicity.","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128295754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
The BGW Protocol for Perfectly-Secure Multiparty Computation 完全安全多方计算的BGW协议
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-120
Gilad Asharov, Yehuda Lindell
{"title":"The BGW Protocol for Perfectly-Secure Multiparty Computation","authors":"Gilad Asharov, Yehuda Lindell","doi":"10.3233/978-1-61499-169-4-120","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-120","url":null,"abstract":"","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134272046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Complexity of Multi-Party Computation Functionalities 多方计算功能的复杂性
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-249
H. K. Maji, M. Prabhakaran, Mike Rosulek
The central objects of secure multiparty computation are the “multiparty functions” (or functionalities) that it seeks to securely realize. In this chapter we survey a set of results that constitute a Cryptographic Complexity Theory. This theory classifies and compares multiparty functions according to their secure computability and reducibility to each other. The basic questions studied, under various notions of security and reducibility, include: • Which functionalities are securely realizable (or are “trivial” – i.e., can be reduced to any functionality)? • Which functionalities are “complete” – i.e., those to which any functionality can be reduced? • More generally, which functionalities are reducible to which? Outside of triviality and completeness, this question is relatively less explored. Reductions yield relative measures of complexity among various functionalities. In the informationtheoretic setting, absolute complexity measures have also been considered. In particular, we discuss results regarding which functions have t-private protocols (in which security is required against a passive adversary corrupting t out of n players) and how this set changes as t increases from 1 to n. We treat separately the results on two-party functionalities, for which the cryptographic complexity is much better understood. In particular, we present unified combinatorial characterizations of completeness and triviality for secure function evaluation using notions of isomorphism and the common information functionality (called the kernel) of a given functionality. Beyond completeness and triviality, we also discuss results on general reducibility, and, in the computationally bounded setting, the connection between these reductions and computational hardness assumptions. We briefly discuss results on reactive functionalities, which are much less studied than non-reactive (secure function evaluation) functionalities. Finally, we conclude with a selection of open problems. ∗Department of Computer Science, University of California, Los Angeles. hmaji@cs.ucla.edu. †Department of Computer Science, University of Illinois, Urbana-Champaign, mmp@uiuc.edu. Supported by NSF grants CNS 07-47027 and CNS 12-28856. ‡Department of Computer Science, University of Montana. mikero@cs.umt.edu. Supported by NSF grant CCF-1149647
安全多方计算的中心对象是它寻求安全实现的“多方功能”(或功能)。在这一章中,我们概述了构成密码复杂性理论的一组结果。该理论根据多方函数的安全可计算性和彼此的可约性对其进行分类和比较。在各种安全性和可简化性的概念下,研究的基本问题包括:•哪些功能是可安全实现的(或者是“微不足道的”-即可以简化为任何功能)?•哪些功能是“完整的”——也就是说,任何功能都可以简化为哪些功能?•更一般地说,哪些功能可以简化为哪些?除了琐碎和完整性之外,这个问题相对较少被探索。减少产生了各种功能之间复杂性的相对度量。在信息理论的背景下,绝对复杂性度量也被考虑在内。特别是,我们讨论了关于哪些函数具有t-private协议的结果(其中需要安全性来防止被动对手从n个参与者中破坏t)以及当t从1增加到n时该集合如何变化。我们分别处理关于两方功能的结果,其中加密复杂性更好地理解。特别是,我们使用同构的概念和给定函数的公共信息功能(称为核),给出了安全函数评估的完整性和琐碎性的统一组合表征。除了完备性和琐碎性之外,我们还讨论了一般可约性的结果,以及在计算有界设置中,这些约约与计算硬度假设之间的联系。我们简要地讨论了响应性功能的结果,与非响应性(安全功能评估)功能相比,响应性功能的研究要少得多。最后,我们总结了一些开放问题。加州大学洛杉矶分校计算机科学系*。hmaji@cs.ucla.edu。†伊利诺伊大学厄巴纳-香槟分校计算机科学系,mmp@uiuc.edu。NSF资助项目CNS 07-47027和CNS 12-28856。蒙大拿大学计算机科学系mikero@cs.umt.edu。国家科学基金CCF-1149647资助
{"title":"Complexity of Multi-Party Computation Functionalities","authors":"H. K. Maji, M. Prabhakaran, Mike Rosulek","doi":"10.3233/978-1-61499-169-4-249","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-249","url":null,"abstract":"The central objects of secure multiparty computation are the “multiparty functions” (or functionalities) that it seeks to securely realize. In this chapter we survey a set of results that constitute a Cryptographic Complexity Theory. This theory classifies and compares multiparty functions according to their secure computability and reducibility to each other. The basic questions studied, under various notions of security and reducibility, include: • Which functionalities are securely realizable (or are “trivial” – i.e., can be reduced to any functionality)? • Which functionalities are “complete” – i.e., those to which any functionality can be reduced? • More generally, which functionalities are reducible to which? Outside of triviality and completeness, this question is relatively less explored. Reductions yield relative measures of complexity among various functionalities. In the informationtheoretic setting, absolute complexity measures have also been considered. In particular, we discuss results regarding which functions have t-private protocols (in which security is required against a passive adversary corrupting t out of n players) and how this set changes as t increases from 1 to n. We treat separately the results on two-party functionalities, for which the cryptographic complexity is much better understood. In particular, we present unified combinatorial characterizations of completeness and triviality for secure function evaluation using notions of isomorphism and the common information functionality (called the kernel) of a given functionality. Beyond completeness and triviality, we also discuss results on general reducibility, and, in the computationally bounded setting, the connection between these reductions and computational hardness assumptions. We briefly discuss results on reactive functionalities, which are much less studied than non-reactive (secure function evaluation) functionalities. Finally, we conclude with a selection of open problems. ∗Department of Computer Science, University of California, Los Angeles. hmaji@cs.ucla.edu. †Department of Computer Science, University of Illinois, Urbana-Champaign, mmp@uiuc.edu. Supported by NSF grants CNS 07-47027 and CNS 12-28856. ‡Department of Computer Science, University of Montana. mikero@cs.umt.edu. Supported by NSF grant CCF-1149647","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The IPS Compiler IPS编译器
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-201
Abhishek Jain, A. Sahai
{"title":"The IPS Compiler","authors":"Abhishek Jain, A. Sahai","doi":"10.3233/978-1-61499-169-4-201","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-201","url":null,"abstract":"","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Short Tutorial of Zero-Knowledge 零知识的简短教程
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-28
Oded Goldreich
{"title":"A Short Tutorial of Zero-Knowledge","authors":"Oded Goldreich","doi":"10.3233/978-1-61499-169-4-28","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-28","url":null,"abstract":"","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121925909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
General Cryptographic Protocols: The Very Basics 通用加密协议:基本原理
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-1
Oded Goldreich
{"title":"General Cryptographic Protocols: The Very Basics","authors":"Oded Goldreich","doi":"10.3233/978-1-61499-169-4-1","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-1","url":null,"abstract":"","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128048835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information-Theoretic Secure Multiparty Computation 信息论安全多方计算
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-169-4-168
U. Maurer, Vassilis Zikas
{"title":"Information-Theoretic Secure Multiparty Computation","authors":"U. Maurer, Vassilis Zikas","doi":"10.3233/978-1-61499-169-4-168","DOIUrl":"https://doi.org/10.3233/978-1-61499-169-4-168","url":null,"abstract":"","PeriodicalId":197241,"journal":{"name":"Secure Multi-Party Computation","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121591277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Secure Multi-Party Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1