首页 | 本学科首页   官方微博 | 高级检索  
     


Oblivious polynomial evaluation
Authors:Email author" target="_blank">Hong-Da?LiEmail author  Dong-Yao?Ji  Deng-Guo?Feng  Bao?Li
Affiliation:(1) State Key Lab of Information Security, Graduate School of Chinese Academy of Sciences, 100039 Beijing, P.R. China
Abstract:The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomialP(z) and the other party (Bob) with an inputx wants to learnP(x) in such an oblivious way that Bob obtainsP(x) without learning any additional information aboutP except what is implied byP(x) and Alice does not know Bob's inputx. The former OPE protocols are based on an intractability assumption except for OT protocols. In fact, evaluatingP(x) is equivalent to computing the product of the coefficient vectors (a 0,...,a n ) and (1, …,x n ). Using this idea, an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol. Compared with the existing OPE protocol, another characteristic of the proposed protocols is the degree of the polynomial is private. Another OPE protocol works in case of existence of untrusted third party. Supported by the National High Technology Research and Development 863 Program of China (Grant No. 2001AA144040). Hong-Da Li, male, born in 1960, received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol. E-mail: lihongda@is.ac.cn;hdli@gscas.ac.cn Dong-Yao Ji, male, born in 1962, received the Ph.D. degree from Xidian University in 2001. His current research interests are cryptology and cryptographic protocol. Deng-Guo Feng, male, born in 1963. He is a professor and Ph.D. supervisor. His research interests focus on information security. Bao Li, male, born in 1965, received his Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems.
Keywords:oblivious polynomial evaluation  oblivious transfer  secure multi-party computation  information security
本文献已被 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号