Secure two-party computation protocols for mapping-equivalence problem

  • Min Yao Ma*
  • , Shou Shan Luo
  • , Li Cheng Wang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Secure multi-party computation protocol allows a set of n-parties to evaluate a joint function of their inputs such that the function is calculated correctly and furthermore no information about their inputs is revealed by the output of the function. Based on the determinate-commutative cryptosystem and under the semi-honest model hypothesis, secure two-party computation protocols for determine whether an element is belong to a certain finite set, whether two finite sets are equal, and whether two equivalence relations are equal are considered. A mathematic method, relates to kernel, image and kernel-classes of mapping, to determine whether two mappings are equal is introduced. Furthermore, two-party computation protocol for determine whether two mappings are equal is given. Correctness, security, and efficiency of our protocols are analyzed.

Original languageEnglish
Pages (from-to)5-8
Number of pages4
JournalBeijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
Volume31
Issue number6
Publication statusPublished - Dec 2008
Externally publishedYes

Keywords

  • Cryptography
  • Equivalent relation
  • Finite full transformation semigroup
  • Mapping
  • Secure two-party computation

Fingerprint

Dive into the research topics of 'Secure two-party computation protocols for mapping-equivalence problem'. Together they form a unique fingerprint.

Cite this