Graph coloring applied to secure computation in non-Abelian groups


Autoria(s): Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Sun, Xiaoming; Tartary, Chrisophe; Wang, Huaxiong; Yao, Andrew Chi-Chih
Data(s)

01/10/2012

Resumo

We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.

Identificador

http://eprints.qut.edu.au/69328/

Publicador

Springer-Verlag

Relação

http://link.springer.com/article/10.1007%2Fs00145-011-9104-3

DOI:10.1007/s00145-011-9104-3

Desmedt, Yvo, Pieprzyk, Josef, Steinfeld, Ron, Sun, Xiaoming, Tartary, Chrisophe, Wang, Huaxiong, & Yao, Andrew Chi-Chih (2012) Graph coloring applied to secure computation in non-Abelian groups. Journal of Cryptology, 25(4), pp. 557-600.

Direitos

Copyright 2011 International Association for Cryptologic Research

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Multiparty computation #Graph coloring #Non-Abelian group #Black-box operations #Planar graph #Percolation theory #Word problem
Tipo

Journal Article