Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Secure circuit evaluation A protocol based on hiding information from an oracle \Lambda
 

Summary: Secure circuit evaluation
A protocol based on hiding information from an oracle \Lambda
Mart'in Abadi
DEC Systems Research Center
130 Lytton Avenue
Palo Alto, CA 94301
Joan Feigenbaum
AT&T Bell Laboratories
600 Mountain Avenue
Murray Hill, NJ 07974
Abstract: We present a simple protocol for two­player secure circuit evaluation. The pro­
tocol enables players C and D to cooperate in the computation of f(x) while D conceals her
data x from C and C conceals his circuit for f from D. The protocol is based on the tech­
nique of hiding information from an oracle [Abadi, Feigenbaum, Kilian, J. Comput. System
Sci. 39(1):21--50, August, 1989].
1. Introduction
This paper describes a protocol for two­player secure circuit evaluation. We think of
player C as a computer that runs a secret program for f and player D as another computer
with some confidential data x. Suppose that D wishes to compute f(x) but does not have
an algorithm for f , and that C is willing to let D use his algorithm but does not want to

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences