Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/11750321_52guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Secure computations in a minimal model using multiple-valued ESOP expressions

Published: 15 May 2006 Publication History

Abstract

This paper deals with secure computations in a minimal model, and gives a protocol which securely computes every function by means of the techniques of exclusive-or sum-of-products (ESOP) expressions. The communication complexity of our protocol is proportional to the size of an obtained multiple-valued-input ESOP expression. Since the historical research on minimizing ESOP expressions is now still active, our protocol will turn to an efficient one as this research progresses. Thus, this paper gives an application of ESOP expressions to designing cryptographic protocols, and we hope that it would motivate further research on minimizing ESOP expressions.

References

[1]
C. Cachin and J. Camenisch, "Optimistic fair secure computation," Proc. CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 93-111, Springer-Verlag, 2000.
[2]
C. Cachin, J. Camenisch, J. Kilian, and J. Müller, "One-round secure computation and secure autonomous mobile agents," Proc. ICALP 2000, Lecture Notes in Computer Science, vol. 1853, pp. 512-523, Springer-Verlag, 2000.
[3]
U. Feige, J. Kilian, and M. Naor, "A minimal model for secure computation," Proceedings of the 26th ACM Symposium on Theory of Computing (STOC '94), pp. 554-563, 1994.
[4]
H. Fleisher, M. Tavel, and J. Yeager, "A computer algorithm for minimizing Reed-Muller canonical forms," IEEE Transactions on Computers, vol. 36, no. 2, pp. 247- 250, 1987.
[5]
A. Gaidukov, "Algorithm to derive minimum esop for 6-variable. function," Proceedings of the fifth International Workshop on Boolean Problems, 2002.
[6]
A. Gál and A. Rosén, "A theorem on sensitivity and applications in private computation," SIAM Journal on Computing, vol. 31, no. 5, pp. 1424-1437, 2002.
[7]
A. Gál and A. Rosén, "Lower bounds on the amount of randomness in private computation," Proceedings of the 35th ACM Symposium on Theory of Computing (STOC '03), pp. 659-666, 2003.
[8]
O. Goldreich, "Foundations of Cryptography II: Basic Applications," Cambridge University Press, Cambridge, 2004.
[9]
T. Hirayama, Y. Nishitani, and T. Sato, "A faster algorithm of minimizing ANDEXOR expressions," IEICE Trans. Fundamentals, vol. E85-A, no. 12, pp. 2708- 2714, 2002.
[10]
Y. Ishai and E. Kushilevitz, "Private simultaneous messages protocols with applications," Proceedings of the fifth Israel Symposium on the Theory of Computing Systems (ISTCS '97), pp. 174-183, 1997.
[11]
E. Kushilevitz, R. Ostrovsky, and A. Rosén, "Characterizing linear size circuits in terms of privacy," Journal of Computer and System Sciences, vol. 58, no. 1, pp. 129-136, 1999.
[12]
T. Sasao, "EXMIN2: a simplification algorithm for exclusive-or sum-of-products expressions for multiple-valued-input two-valued-output functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 12, no. 5, pp. 621-632, 1993.
[13]
T. Sasao, "Switching Theory for Logic Synthesis," Kluwer Academic Publishers, Boston, MA, 1999.
[14]
T. Sasao and P. Besslich, "On the complexity of mod-2 sum PLA's," IEEE Transactions on Computers, vol. 39, no. 2, pp. 262-266, 1990.
[15]
N. Song and M. A. Perkowski, "Minimization of exclusive sum-of-products expressions for multiple-valued input, incompletely specified functions," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 15, no. 4, pp. 385-395, 1996.
[16]
S. Stergiou and G. Papakonstantinou, "Exact minimization of ESOP expressions with less than eight product terms," Journal of Circuits, Systems and Computers, vol. 13, no. 1, pp. 1-15, 2004.
[17]
S. Stergiou, D. Voudouris, and G. Papakonstantinou, "Multiple-value exclusive-or sum-of-products minimization algorithms," IEICE Trans. Fundamentals, vol. E87- A, no. 5, pp. 1226-1234, 2004.
[18]
A. Yao, "Protocols for secure computations," Proceedings of the 23th IEEE Symposium on Foundations of Computer Science (FOCS '82), pp. 160-164, 1982.
[19]
Y. Ye and K. Roy, "An XOR-based decomposition diagram and its application in synthesis of AND/XOR networks," IEICE Trans. Fundamentals, vol. E80-A, no. 10, pp. 1742-1748, 1997.

Cited By

View all
  • (2007)Secure multiparty computations using a dial lockProceedings of the 4th international conference on Theory and applications of models of computation10.5555/1767854.1767901(499-510)Online publication date: 22-May-2007

Index Terms

  1. Secure computations in a minimal model using multiple-valued ESOP expressions
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          TAMC'06: Proceedings of the Third international conference on Theory and Applications of Models of Computation
          May 2006
          792 pages
          ISBN:3540340211
          • Editors:
          • Jin-Yi Cai,
          • S. Barry Cooper,
          • Angsheng Li

          Sponsors

          • Institute of Software, Chinese Academy of Sciences
          • NSF of China: The National Natural Science Foundation of China
          • Chinese Academy of Sciences

          Publisher

          Springer-Verlag

          Berlin, Heidelberg

          Publication History

          Published: 15 May 2006

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 03 Oct 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2007)Secure multiparty computations using a dial lockProceedings of the 4th international conference on Theory and applications of models of computation10.5555/1767854.1767901(499-510)Online publication date: 22-May-2007

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media