Presentation 2012-07-20
A Batch Mapping Algorithm for Secure Function Evaluation
Koki HAMADA, Dai IKARASHI, Koji CHIDA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function evaluation is a technique that conducts any computation without decrypting given encrypted input data. The main problem of secure function evaluation is its inefficient running time. One of the reasons for the inefficiency is that complexities of many algorithms are significantly increased when the algorithms are ported to secure function evaluation. To improve the efficiency, we propose an algorithm for secure function evaluation. The proposed algorithm enables secure function evaluation systems to pre-compute complex tasks, save the resulting values to a table called lookup table, and refer the table instead of computing at runtime. The algorithm is designed to refer a lookup table of size m for n input values at a time. The algorithm exhibits the complexity of O(log(m+n)) rounds and O((m+n) log(m+n)) communications.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) secure function evaluation / multi-party protocol / mapping / lookup table
Paper # ISEC2012-36,SITE2012-32,ICSS2012-38,EMM2012-28
Date of Issue

Conference Information
Committee ISEC
Conference Date 2012/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Batch Mapping Algorithm for Secure Function Evaluation
Sub Title (in English)
Keyword(1) secure function evaluation
Keyword(2) multi-party protocol
Keyword(3) mapping
Keyword(4) lookup table
1st Author's Name Koki HAMADA
1st Author's Affiliation Nippon Telegraph and Telephone Corporation()
2nd Author's Name Dai IKARASHI
2nd Author's Affiliation Nippon Telegraph and Telephone Corporation
3rd Author's Name Koji CHIDA
3rd Author's Affiliation Nippon Telegraph and Telephone Corporation
Date 2012-07-20
Paper # ISEC2012-36,SITE2012-32,ICSS2012-38,EMM2012-28
Volume (vol) vol.112
Number (no) 126
Page pp.pp.-
#Pages 5
Date of Issue