Secure Reusable Garbled Random Access Machine
碩士 === 國立中山大學 === 資訊工程學系研究所 === 103 === In 1980s, Yao proposed a secure computation which can allow two parties, one of which has a function f(⋅) and the other one has data x, to compute f(x) without revealing anything about f and x. Garbled circuits got numerous applications. But every time we want...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/h47xfu |
id |
ndltd-TW-103NSYS5392059 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NSYS53920592019-05-15T22:17:49Z http://ndltd.ncl.edu.tw/handle/h47xfu Secure Reusable Garbled Random Access Machine 安全且可重覆使用之模糊隨機存取機器 Chih-Yu Chen 陳志瑜 碩士 國立中山大學 資訊工程學系研究所 103 In 1980s, Yao proposed a secure computation which can allow two parties, one of which has a function f(⋅) and the other one has data x, to compute f(x) without revealing anything about f and x. Garbled circuits got numerous applications. But every time we want to garble a program, we need to convert it into a circuit first. In 2013, Lu and Ostrovsky proposed the garbled random-access machines, which can garble a RAM program directly. They constructed garbled RAM based on the pseudo-random functions and the Beaver-Micali-Rogaway paradigm in the semi-honest model. In Lu-Ostrovsky construction, the garbled data is reusable, but the garbled programs are not reusable. Therefore, we propose a reusable garbled RAM with both the reusable data and programs. Our first construction is designed in the semi-honest model for less computational cost. The second construction is based on the approach of Lindell and Pinkas, which used the cut-and-choose technique to resist the malicious adversary. Chun-I Fan 范俊逸 2015 學位論文 ; thesis 59 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊工程學系研究所 === 103 === In 1980s, Yao proposed a secure computation which can allow two parties, one of which has a function f(⋅) and the other one has data x, to compute f(x) without revealing anything about f and x. Garbled circuits got numerous applications. But every time we want to garble a program, we need to convert it into a circuit first. In 2013, Lu and Ostrovsky proposed the garbled random-access machines, which can garble a RAM program directly. They constructed garbled RAM based on the pseudo-random functions and the Beaver-Micali-Rogaway paradigm in the semi-honest model.
In Lu-Ostrovsky construction, the garbled data is reusable, but the garbled programs are not reusable. Therefore, we propose a reusable garbled RAM with both the reusable data and programs. Our first construction is designed in the semi-honest model for less computational cost. The second construction is based on the approach of Lindell and Pinkas, which used the cut-and-choose technique to resist the malicious adversary.
|
author2 |
Chun-I Fan |
author_facet |
Chun-I Fan Chih-Yu Chen 陳志瑜 |
author |
Chih-Yu Chen 陳志瑜 |
spellingShingle |
Chih-Yu Chen 陳志瑜 Secure Reusable Garbled Random Access Machine |
author_sort |
Chih-Yu Chen |
title |
Secure Reusable Garbled Random Access Machine |
title_short |
Secure Reusable Garbled Random Access Machine |
title_full |
Secure Reusable Garbled Random Access Machine |
title_fullStr |
Secure Reusable Garbled Random Access Machine |
title_full_unstemmed |
Secure Reusable Garbled Random Access Machine |
title_sort |
secure reusable garbled random access machine |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/h47xfu |
work_keys_str_mv |
AT chihyuchen securereusablegarbledrandomaccessmachine AT chénzhìyú securereusablegarbledrandomaccessmachine AT chihyuchen ānquánqiěkězhòngfùshǐyòngzhīmóhúsuíjīcúnqǔjīqì AT chénzhìyú ānquánqiěkězhòngfùshǐyòngzhīmóhúsuíjīcúnqǔjīqì |
_version_ |
1719127924861304832 |