Introduction to secure computation

Authors
Citation
R. Cramer, Introduction to secure computation, LECT N COMP, 1561, 1999, pp. 16-62
Citations number
76
Categorie Soggetti
Current Book Contents
Journal title
ISSN journal
03029743
Volume
1561
Year of publication
1999
Pages
16 - 62
Database
ISI
SICI code
0302-9743(1999)1561:<16:ITSC>2.0.ZU;2-Q
Abstract
The objective of this paper(1) is to give an elementary introduction to fun damental concepts, techniques and results of Secure Computation, Topics covered include classical results for general secure computation by Yao, Goldreich & Micali & Wigderson: Kilian. Pen-Or & Goldwasser Sr Wigders on, and Chaum & Crepeau & Damgaard. We also introduce such concepts as oblivious transfer: security against mal icious attacks and verifiable secret sharing, and for some of these importa nt primitives we discuss realization, This paper is organized as follows. Part I deals with oblivious transfer and secure (general) two-party computa tion. Part II discusses secure general multi-party computation and verifiable sec ret sharing, Part III addresses information theoretic security and presents detailed but elementary explanations of some recent results in Verifiable Secret Sharin g and Multi-Party Computation. The importance of theory and general techniques often lies in the fact that the true nature of security is uncovered and that this henceforth enables to explore what is "possible at all". This then motivates the search for co ncrete and often specialized realizations that are more efficient, Neverthe less, many principles developed as part of the general theory are fundament al to the design of practical solutions as well.