Oblivious Comparator and Its Application to Secure Auction Protocol (特集:プライバシを保護するコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
This paper presents a protocol for Secure Function Evaluation (SFE) in which n players have secret inputs E[a_1], E[a_2],・・・, E[a_n], of a known boolean function f, and they collaborate to compute the ciphertext of the output of the boolean function, E[f(a_1,・・・,a_n)]. The main result is a completeness theorem (Theorem 3.1) which states that an arbitrary function can be evaluated at the oblivious party without help of private information. The proposed protocol is based on the Jakobsson and Juels's Mix-and-Match scheme (Jakobsson and Jules, 2000) in which the truth table of a target function is row-wise randomized (mixing) using a Mix network, and then players perform "matching" the designated output ciphertext and the corresponding rows. The biggest difference between the proposed SFE and the Mixand-Match is that the proposed protocol does not require any involvement of key holders to evaluate function, while the Mix-and-Match needs key holders to perform threshold decryptions at every step of evaluation of boolean gates. One disadvantage of the proposed scheme is the Reed-Muller expansion (Sasao, 1997) involves an exponential blow-up in the number of input, n, as the same as the conventional schemes, e.g., CyptoComputer proposed by Sander, Young, and Yung (1999). This paper presents an efficient construction for a primitive called ' oblivious comparator' with n-round complexity between the comparator and n players but the bandwidth spent by one communication is independent from n (linear to the size of values to be compared), and hence it does not suffer the blow-up in n. The oblivious comparator is suitable to implement a secure auction because an auctioneer communicates with bidders once at time, and performs evaluation without help of trusted key holders. In addition, the proposed construction allows arbitrary complicated functions including a search for second highest, a resolution the winner, and a dynamic programming (for combinatorial auction).
- 2004-08-15
著者
-
Kikuchi H
Department Of Information Media Technology School Of Information Technology And Electronics Tokai Un
-
Kikuchi Hiroaki
Department Electrical Engineering Tokai Univeristy
関連論文
- Oblivious Comparator and Its Application to Secure Auction Protocol (特集:プライバシを保護するコンピュータセキュリティ技術)
- Microwave coagulation therapy for hepatocellular carcinoma
- Heparin Reduces Serum Levels of Endothelin-1 and Hepatic Ischemia Reperfusion Injury in Rabbits
- Comparative in vitro activity of carbapenem antibiotics against respiratory pathogens isolated in recent years
- Identification of Mycobacterium avium Complex Isolated in Eastern and Central Japan by Using DNA Probes
- Multi-Round Anonymous Auction Protocols (Special Issue on Internet Technology and Its Applications)
- Enhancement of the Efficacy of Anticancer Drugs with Electroporation : Successful Electrochemotherapy against Gastric Cancer Cell Lines in Vivo and in Vitro
- Enhancing the Effect of Anticancer Drugs against the Colorectal Cancer Cell Line with Electroporation
- Features of DNA Oligonucleosomal Fragmentation in Human Tumor Cell Lines and Its Detection by Flow Cytometry : Utility and Limitations
- Attaching of Poly(acrylic acid) to Inorganic Surface and Its Application to Enzyme Immobilization
- Side Chain Dynamics in Poly(ethyl acrylate) Studied by Molecular Dynamics Simulation
- Online Certification Status Verification with a Red-Black Hash Tree (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Online Certification Status Verification with a Red-Black Hash Tree
- Certificate Revocation Protocol Using k-Ary Hash Tree (Special Issue on Internet Technology)
- Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm
- FOREWORD
- Evaluation of a Classification Method of Web-pages with Decision Tree Algorithm (SCHOOL OF INFORMATION TECHNOLOGY AND ELECTRONICS)
- Time Zone Correlation Analysis of Malware/Bot Downloads
- Development of Remote Control Vehicle via Internet and its Usability in terms of Quality of Service
- Privacy-preserving Collaborative Filtering Using Randomized Response
- Privacy-preserving Collaborative Filtering Using Randomized Response
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm
- Online Certification Status Verification with a Red-Black Hash Tree