International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Graph Coloring Applied to Secure Computation in Non-Abelian Groups

Authors:
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Xiaoming Sun
Christophe Tartary
Huaxiong Wang
Andrew Chi-Chih Yao
Download:
DOI: 10.1007/s00145-011-9104-3
Search ePrint
Search Google
Abstract: We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.Our results are as follows. We initiate a novel approach for the construction of black-box protocols for G-circuits based on k-of-k threshold secret-sharing schemes, which are efficiently implementable over any black-box (non-Abelian) group G. We reduce the problem of constructing such protocols to a combinatorial coloring problem in planar graphs. We then give three constructions for such colorings. Our first approach leads to a protocol with optimal resilience t
BibTeX
@article{jofc-2012-29486,
  title={Graph Coloring Applied to Secure Computation in Non-Abelian Groups},
  journal={Journal of Cryptology},
  publisher={Springer},
  volume={25},
  pages={557-600},
  doi={10.1007/s00145-011-9104-3},
  author={Yvo Desmedt and Josef Pieprzyk and Ron Steinfeld and Xiaoming Sun and Christophe Tartary and Huaxiong Wang and Andrew Chi-Chih Yao},
  year=2012
}