How to Solve any Protocol Problem - An Efficiency Improvement

作者: Oded Goldreich , Ronen Vainish

DOI:

关键词: Reduction (complexity)Quadratic residuosity problemMathematicsFunction (mathematics)Mathematical optimizationSimple (abstract algebra)Value (computer science)Protocol (object-oriented programming)Turing machineOblivious transferTheoretical computer science

摘要: … In this paper, we present direct solutions to the above two particular protocol problems, … ing both problems. The first approach consists of a simple reduction of these two problems to a …

参考文章(10)
Josh Cohen Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret international cryptology conference. pp. 251- 260 ,(1987)
Shimon Even, Oded Goldreich, Abraham Lempel, A randomized protocol for signing contracts Communications of the ACM. ,vol. 28, pp. 637- 647 ,(1985) , 10.1145/3812.3818
Benny Chor, Shafi Goldwasser, Silvio Micali, Baruch Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults 26th Annual Symposium on Foundations of Computer Science (sfcs 1985). pp. 383- 395 ,(1985) , 10.1109/SFCS.1985.64
O. Goldreich, S. Micali, A. Wigderson, How to play ANY mental game symposium on the theory of computing. pp. 218- 229 ,(1987) , 10.1145/28395.28420
Andrew C Yao, None, Theory and application of trapdoor functions foundations of computer science. pp. 80- 91 ,(1982) , 10.1109/SFCS.1982.95
Andrew Chi-Chih Yao, How to generate and exchange secrets 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). pp. 162- 167 ,(1986) , 10.1109/SFCS.1986.25
D A Barrington, Bounded-width polynomial-size branching programs recognize exactly those languages in NC1 symposium on the theory of computing. ,vol. 38, pp. 1- 5 ,(1986) , 10.1145/12130.12131
Oded Goldreich, Silvio Micali, Avi Wigderson, Proofs that yield nothing but their validity and a methodology of cryptographic protocol design 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). pp. 174- 187 ,(1986) , 10.1109/SFCS.1986.47
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638
Avi Wigderson, Oded Goldreich, Silvio Micali, How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority symposium on the theory of computing. pp. 218- 229 ,(1987)