Presentation | 2012-07-20 A Batch Mapping Algorithm for Secure Function Evaluation Koki HAMADA, Dai IKARASHI, Koji CHIDA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We propose an algorithm that realizes batch reference of lookup table for secure function evaluation. Secure function evaluation is a technique that conducts any computation without decrypting given encrypted input data. The main problem of secure function evaluation is its inefficient running time. One of the reasons for the inefficiency is that complexities of many algorithms are significantly increased when the algorithms are ported to secure function evaluation. To improve the efficiency, we propose an algorithm for secure function evaluation. The proposed algorithm enables secure function evaluation systems to pre-compute complex tasks, save the resulting values to a table called lookup table, and refer the table instead of computing at runtime. The algorithm is designed to refer a lookup table of size m for n input values at a time. The algorithm exhibits the complexity of O(log(m+n)) rounds and O((m+n) log(m+n)) communications. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | secure function evaluation / multi-party protocol / mapping / lookup table |
Paper # | ISEC2012-36,SITE2012-32,ICSS2012-38,EMM2012-28 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2012/7/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Batch Mapping Algorithm for Secure Function Evaluation |
Sub Title (in English) | |
Keyword(1) | secure function evaluation |
Keyword(2) | multi-party protocol |
Keyword(3) | mapping |
Keyword(4) | lookup table |
1st Author's Name | Koki HAMADA |
1st Author's Affiliation | Nippon Telegraph and Telephone Corporation() |
2nd Author's Name | Dai IKARASHI |
2nd Author's Affiliation | Nippon Telegraph and Telephone Corporation |
3rd Author's Name | Koji CHIDA |
3rd Author's Affiliation | Nippon Telegraph and Telephone Corporation |
Date | 2012-07-20 |
Paper # | ISEC2012-36,SITE2012-32,ICSS2012-38,EMM2012-28 |
Volume (vol) | vol.112 |
Number (no) | 126 |
Page | pp.pp.- |
#Pages | 5 |
Date of Issue |