首页 | 本学科首页   官方微博 | 高级检索  
     


Distributed oblivious function evaluation and its applications
Authors:Hong-Da?Li  author-information"  >  author-information__contact u-icon-before"  >  mailto:hdli@gscas.ac.cn"   title="  hdli@gscas.ac.cn"   itemprop="  email"   data-track="  click"   data-track-action="  Email author"   data-track-label="  "  >Email author,Xiong?Yang,Deng-Guo?Feng,Bao?Li
Affiliation:(1) State Key Lab of Information Security, Graduate School of Chinese Academy of Sciences, 100039 Beijing, P.R. China;(2) College of Economy and Trade, South China University of Tropical Agriculture, 571737 Sanya, P.R. China
Abstract:This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a functionf(x), and the other party (Bob) with an input α wants to learnf(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret functionf(x) among the servers. Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper. The research is supported by the National Basic Research 973 Program of China under Grant No. 1999035802 and the National Natural Science Foundation of China under Grant No.60273029. Hong-Da Li was born in 1960. He received the Ph.D. degree from Northwestern Polytechnical University in 2001. His current research interests are cryptology and cryptographic protocol. Xiong Yang received the B.S. degree in mathematics from Yan'an University, China, in 1984. He is an associate professor in College of Economy and Trade at South China University of Tropical Agriculture. His research interest is information security. Deng-Guo Feng was born in 1963. He is now a Ph.D. supervisor. His research interests focus on information security. Bao Li was born in 1965. He received the Ph.D. degree in cryptography in 1995 from Xidian University. His research interests include cryptographic protocols and public key cryptosystems.
Keywords:oblivious function evaluation   oblivious polynomial evaluation   secure multiparty computation   distributed   information security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号