首页 | 本学科首页   官方微博 | 高级检索  
     

Distributed Oblivious Function Evaluation and Its Applications
作者姓名:Hong-DaLi  XiongYang  Deng-GuoFeng  BaoLi
作者单位:[1]StateKeyLabofInformationSecurity,GraduateSchoolofChineseAcademyofSciencesBeijing100039,P.R.China [2]CollegeofEconomyandTrade,SouthChinaUniversityofTropicalAgriculture,Sanya571737,P.R.China
基金项目:The research is supported by the National Basic Research 973 Program of China under Grant No.1999035802,the National Natural Science Foundation of China under Grant No.60273029.
摘    要:This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a function f(x), and the other party (Bob) with an input α wants to learn f(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret function f(x) among the servers.Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper.

关 键 词:函数求值  多项式计算  信息安全  分布式计算

Distributed oblivious function evaluation and its applications
Hong-DaLi XiongYang Deng-GuoFeng BaoLi.Distributed Oblivious Function Evaluation and Its Applications[J].Journal of Computer Science and Technology,2004,19(6):0-0.
Authors:Email author" target="_blank">Hong-Da?LiEmail author  Xiong?Yang  Deng-Guo?Feng  Bao?Li
Affiliation:(1) State Key Lab of Information Security, Graduate School of Chinese Academy of Sciences, 100039 Beijing, P.R. China;(2) College of Economy and Trade, South China University of Tropical Agriculture, 571737 Sanya, P.R. China
Abstract:This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029. Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol. Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security. Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security. Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems.
Keywords:oblivious function evaluation  oblivious polynomial evaluation  secure multiparty computation  distributed  information security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号