ridm@nrct.go.th   ระบบคลังข้อมูลงานวิจัยไทย   รายการโปรดที่คุณเลือกไว้

Graph coloring applied to secure computation in non-Abelian groups

หน่วยงาน Nanyang Technological University, Singapore

รายละเอียด

ชื่อเรื่อง : Graph coloring applied to secure computation in non-Abelian groups
นักวิจัย : Desmedt, Yvo , Pieprzyk, Josef , Steinfeld, Ron , Sun, Xiaoming , Tartary, Christophe , Wang, Huaxiong , Yao, Andrew Chi-Chih
คำค้น : DRNTU::Science.
หน่วยงาน : Nanyang Technological University, Singapore
ผู้ร่วมงาน : -
ปีพิมพ์ : 2554
อ้างอิง : Desmedt, Y., Pieprzyk, J., Steinfeld, R., Sun, X., Tartary, C., Wang, H., et al. (2012). Graph Coloring Applied to Secure Computation in Non-Abelian Groups. Journal of Cryptology, 25(4), 557-600. , 0933-2790 , http://hdl.handle.net/10220/11624 , http://dx.doi.org/10.1007/s00145-011-9104-3
ที่มา : -
ความเชี่ยวชาญ : -
ความสัมพันธ์ : Journal of Cryptology
ขอบเขตของเนื้อหา : -
บทคัดย่อ/คำอธิบาย :

We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted. Our results are as follows. We initiate a novel approach for the construction of black-box protocols for G-circuits based on k-of-k threshold secret-sharing schemes, which are efficiently implementable over any black-box (non-Abelian) group G. We reduce the problem of constructing such protocols to a combinatorial coloring problem in planar graphs. We then give three constructions for such colorings. Our first approach leads to a protocol with optimal resilience t

บรรณานุกรม :
Desmedt, Yvo , Pieprzyk, Josef , Steinfeld, Ron , Sun, Xiaoming , Tartary, Christophe , Wang, Huaxiong , Yao, Andrew Chi-Chih . (2554). Graph coloring applied to secure computation in non-Abelian groups.
    กรุงเทพมหานคร : Nanyang Technological University, Singapore.
Desmedt, Yvo , Pieprzyk, Josef , Steinfeld, Ron , Sun, Xiaoming , Tartary, Christophe , Wang, Huaxiong , Yao, Andrew Chi-Chih . 2554. "Graph coloring applied to secure computation in non-Abelian groups".
    กรุงเทพมหานคร : Nanyang Technological University, Singapore.
Desmedt, Yvo , Pieprzyk, Josef , Steinfeld, Ron , Sun, Xiaoming , Tartary, Christophe , Wang, Huaxiong , Yao, Andrew Chi-Chih . "Graph coloring applied to secure computation in non-Abelian groups."
    กรุงเทพมหานคร : Nanyang Technological University, Singapore, 2554. Print.
Desmedt, Yvo , Pieprzyk, Josef , Steinfeld, Ron , Sun, Xiaoming , Tartary, Christophe , Wang, Huaxiong , Yao, Andrew Chi-Chih . Graph coloring applied to secure computation in non-Abelian groups. กรุงเทพมหานคร : Nanyang Technological University, Singapore; 2554.