CryptoDB
Yvo Desmedt
Publications
Year
Venue
Title
2012
JOFC
Graph Coloring Applied to Secure Computation in Non-Abelian Groups
Abstract
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.Our results are as follows. We initiate a novel approach for the construction of black-box protocols for G-circuits based on k-of-k threshold secret-sharing schemes, which are efficiently implementable over any black-box (non-Abelian) group G. We reduce the problem of constructing such protocols to a combinatorial coloring problem in planar graphs. We then give three constructions for such colorings. Our first approach leads to a protocol with optimal resilience t<n/2, but it requires exponential communication complexity $O({\binom{2 t+1}{t}}^{2} \cdot N_{g})$ group elements and round complexity $O(\binom{2 t + 1}{t} \cdot N_{g})$, for a G-circuit of size Ng. Nonetheless, using this coloring recursively, we obtain another protocol to t-privately compute G-circuits with communication complexity $\mathcal{P}\mathit{oly}(n)\cdot N_{g}$ for any t∈O(n1−ϵ) where ϵ is any positive constant. For our third protocol, there is a probability δ (which can be made arbitrarily small) for the coloring to be flawed in term of security, in contrast to the first two techniques, where the colorings are always secure (we call this protocol probabilistic, and those earlier protocols deterministic). This third protocol achieves optimal resilience t<n/2. It has communication complexity O(n5.056(n+log δ−1)2⋅Ng) and the number of rounds is O(n2.528⋅(n+log δ−1)⋅Ng).
1999
EUROCRYPT
1998
ASIACRYPT
1995
EUROCRYPT
1994
ASIACRYPT
1992
CRYPTO
1992
EUROCRYPT
1991
ASIACRYPT
1989
CRYPTO
1986
CRYPTO
1985
CRYPTO
1985
CRYPTO
Program Committees
- PKC 2016
- PKC 2007
- Asiacrypt 2006
- PKC 2005
- PKC 2004
- PKC 2003 (Program chair)
- PKC 2002
- PKC 2001
- Asiacrypt 2000
- PKC 2000
- PKC 1999
- Eurocrypt 1998
- Asiacrypt 1994
- Eurocrypt 1994
- Crypto 1994 (Program chair)
- Eurocrypt 1993
- Auscrypt 1992
- Eurocrypt 1992
- Asiacrypt 1991
- Crypto 1990
- Eurocrypt 1989
Coauthors
- Samy Bengio (2)
- Thomas Beth (1)
- Luc Bierens (1)
- Simon R. Blackburn (1)
- Gilles Brassard (1)
- Mike Burmester (13)
- Henri Cloetens (1)
- Giovanni Di Crescenzo (1)
- Ivan Damgård (1)
- George I. Davida (3)
- Marc Davio (5)
- Philippe Delsarte (1)
- Yvo Desmedt (59)
- Hiroshi Doi (1)
- Matthias Fitzi (1)
- Marc Fosseprez (1)
- Yair Frankel (4)
- Rosario Gennaro (1)
- Jo Goubert (2)
- Claude Goutier (2)
- René Govaerts (2)
- Frank Hoornaert (3)
- Shuang Hou (1)
- Jan Hulsbosch (1)
- Toshiya Itoh (1)
- Kaoru Kurosawa (5)
- Peter Landrock (1)
- Arjen K. Lenstra (1)
- Masahiro Mambo (1)
- Kevin S. McCurley (1)
- Patrik Neutjens (1)
- Jesper Buus Nielsen (1)
- Andrew M. Odlyzko (3)
- Eiji Okamoto (1)
- René Peralta (2)
- Josef Pieprzyk (2)
- Fred Piper (1)
- Philippe Piret (2)
- Jean-Jacques Quisquater (9)
- Rainer A. Rueppel (1)
- Kouichi Sakurai (1)
- Jennifer Seberry (3)
- Hiroki Shizuya (1)
- Victor Shoup (1)
- Miles E. Smid (1)
- Ron Steinfeld (2)
- Xiaoming Sun (1)
- Mitsuru Tada (1)
- Christophe Tartary (1)
- Joos Vandewalle (2)
- Michael Walker (1)
- Yongge Wang (4)
- Huaxiong Wang (2)
- Peter R. Wild (1)
- Pascal Wouters (1)
- Qiushi Yang (2)
- Andrew Chi-Chih Yao (1)
- Takuya Yoshida (1)
- Yuko Yoshifuji (1)
- Moti Yung (2)