Download now Free registration required
Protocols for secure multi-party computation allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. However, the execution time of a secure protocol may be too high so that it is not practical unless some tradeoffs being made between data access and confidentiality. In this technical paper, the authors propose a set of information theoretically secure protocols based on scalar product protocol and aim to provide some empirical basis for making such tradeoffs in computing exponentiation. A detailed performance evaluation was carried out by taking advantage of the compositional nature of their protocols.
- Format: PDF
- Size: 835.1 KB