Abstract

The area of "computing with encrypted data" has been studied by numerous authors in the past twenty years since it is fundamental to understanding properties of encryption and it has many practical applications. The related fundamental area of "secure function evaluation" has been studied since the mid 80's. In its basic two-party case, two parties (Alice and Bob) evaluate a known circuit over private inputs (or a private input and a private circuit). Much attention has been paid to the important issue of minimizing rounds of computation in this model. Namely, the number of communication rounds in which Alice and Bob need to engage in to evaluate a circuit on encrypted data securely. Advancements in these areas have been recognized as open problems and have remained open for a number of years. In this paper we give a one round, and thus round optimal, protocol for secure evaluation of circuits which is in polynomial time for NC/sup 1/ circuits. The protocol involves an input party sending encrypted input to a second party, a cryptocomputer, which evaluates the circuit (or a known circuit over its additional private input) non-interactively, securely and obliviously, and provides the output to the input party without learning it. This improves on previous (general) results that are specialized to the case of NC/sup 1/ circuits and require a constant number of communication rounds. We further suggest applications to network and mobile computing.

Keywords

EncryptionComputer scienceSecurity parameterAlice (programming language)Homomorphic encryptionProtocol (science)Electronic circuitAlice and BobSecure multi-party computationSecure communicationComputer networkTheoretical computer sciencePrivate networkPolynomialConstant (computer programming)CryptographyComputer securityMathematicsElectrical engineeringEngineering

Affiliated Institutions

Related Publications

Nonmalleable Cryptography

The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is tha...

2000 SIAM Journal on Computing 738 citations

Publication Info

Year
2003
Type
article
Pages
554-566
Citations
279
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

279
OpenAlex

Cite This

Tomas Sander, Adam Young, Moti Yung (2003). Non-interactive cryptocomputing for NC/sup 1/. , 554-566. https://doi.org/10.1109/sffcs.1999.814630

Identifiers

DOI
10.1109/sffcs.1999.814630