Computational soundness of uniformity properties for multi-party computation based on LSSS

Hui Zhao, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We provide a symbolic model for multi-party computation based on linear secret-sharing scheme, and prove that this model is computationally sound: if there is an attack in the computational world, then there is an attack in the symbolic (abstract) model. Our original contribution is that we deal with the uniformity properties, which cannot be described using a single execution trace, while considering an unbounded number of sessions of the protocols in the presence of active and adaptive adversaries.

Original languageEnglish
Title of host publicationTrusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers
EditorsMoti Yung, Jianbiao Zhang, Zhen Yang
PublisherSpringer Verlag
Pages99-113
Number of pages15
ISBN (Print)9783319315492
DOIs
Publication statusPublished - Jan 1 2016
Event7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015 - Beijing, China
Duration: Dec 7 2015Dec 8 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9565
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
CountryChina
CityBeijing
Period12/7/1512/8/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Computational soundness of uniformity properties for multi-party computation based on LSSS'. Together they form a unique fingerprint.

  • Cite this

    Zhao, H., & Sakurai, K. (2016). Computational soundness of uniformity properties for multi-party computation based on LSSS. In M. Yung, J. Zhang, & Z. Yang (Eds.), Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers (pp. 99-113). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 9565). Springer Verlag. https://doi.org/10.1007/978-3-319-31550-8_7