Efficient Round-Optimal Secure Two-Party Computation from Sigma-protocol
In this paper, based on Σ-protocol on HC (a NP-complete language), we firstly construct a Σ-protocol for any NP language thm1 ∧ thm2, then transfer it into a non-interactive protocol from a hash function and a pseudo-random generator. Finally, we construct an efficient round-optimal secure two-party...
Saved in:
| Published in | 2010 International Conference on Communications and Mobile Computing Vol. 1; pp. 26 - 30 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.04.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424463275 1424463270 |
| DOI | 10.1109/CMC.2010.280 |
Cover
| Summary: | In this paper, based on Σ-protocol on HC (a NP-complete language), we firstly construct a Σ-protocol for any NP language thm1 ∧ thm2, then transfer it into a non-interactive protocol from a hash function and a pseudo-random generator. Finally, we construct an efficient round-optimal secure two-party computation protocol from our non-interactive protocols. |
|---|---|
| ISBN: | 9781424463275 1424463270 |
| DOI: | 10.1109/CMC.2010.280 |