Graph coloring applied to secure computation in non-Abelian groups
| Data(s) |
01/10/2012
|
|---|---|
| Resumo |
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted. |
| Identificador | |
| Publicador |
Springer-Verlag |
| Relação |
http://link.springer.com/article/10.1007%2Fs00145-011-9104-3 DOI:10.1007/s00145-011-9104-3 Desmedt, Yvo, Pieprzyk, Josef, Steinfeld, Ron, Sun, Xiaoming, Tartary, Chrisophe, Wang, Huaxiong, & Yao, Andrew Chi-Chih (2012) Graph coloring applied to secure computation in non-Abelian groups. Journal of Cryptology, 25(4), pp. 557-600. |
| Direitos |
Copyright 2011 International Association for Cryptologic Research |
| Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
| Palavras-Chave | #Multiparty computation #Graph coloring #Non-Abelian group #Black-box operations #Planar graph #Percolation theory #Word problem |
| Tipo |
Journal Article |