One-Round Secure Computation and Secure Autonomous Mobile Agents

ICALP(2000)

引用 209|浏览1240
暂无评分
摘要
This paper investigates one-round secure computation between two distrusting parties: Alice and Bob each have private inputs to a common function, but only Alice, acting as the receiver, is to learn the output; the protocol is limited to one message from Alice to Bob followed by one message from Bob to Alice. A model in which Bob may be computationally unbounded is investigated, which corresponds to informationtheoretic security for Alice. It is shown that 1. for honest-but-curious behavior and unbounded Bob, any function computable by a polynomial-size circuit can be computed securely assuming the hardness of the decisional Diffie-Hellman problem; 2. for malicious behavior by both (bounded) parties, any function computable by a polynomial-size circuit can be computed securely, in a public-key framework, assuming the hardness of the decisional Diffie-Hellman problem. The results are applied to secure autonomous mobile agents, which migrate between several distrusting hosts before returning to their originator. A scheme is presented for protecting the agent's secrets such that only the originator learns the output of the computation.
更多
查看译文
关键词
distrusting party,malicious behavior,decisional diffie-hellman problem,common function,secure autonomous mobile agents,unbounded bob,one-round secure computation,computationally unbounded,polynomial-size circuit,distrusting host,function computable,honest-but-curious behavior,secure computation,public key,information theoretic security,computer security,mobile agent
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要