Private simultaneous messages protocols with applications

Yuval Ishai, Eyal Kushilevitz

Research output: Contribution to conferencePaperpeer-review

104 Scopus citations

Abstract

We study the Private Simultaneous Messages (PSM) model which is a variant of the model proposed in [16]. In the PSM model there are n players P1, ..., Pn, each player Pi holding a secret input xi (say, a bit), and all having access to a common random string. Each player sends a single message to a special player, Carol, depending on its own input and the random string (and independently of all other messages). Based on these messages, Carol should be able to compute f(x1, ..., xn) (for some predetermined function f) but should learn no additional information on the values of x1, ..., xn. Our results go in two directions. First, we present efficient PSM protocols, which improve the efficiency of previous solutions, and extend their scope to several function classes for which no such solutions were known before. These classes include most of the important linear algebraic functions; as a result, we get efficient constant-round private protocols (in the standard model) for these classes. Second, we present reductions that allow transforming PSM protocols into solutions for some other problems, thereby demonstrating the power of this model. An interesting reduction of this sort shows how to construct, based on a standard (12)-OT (Oblivious Transfer) primitive, generalized-OT (GOT) primitives that, we believe, might be useful for the design of cryptographic protocols.

Original languageEnglish
Pages174-183
Number of pages10
StatePublished - 1997
Externally publishedYes
EventProceedings of the 1997 5th Israel Symposium on Theory of Computing and Systems, ISTCS - Ramat-Gan, Isr
Duration: 17 Jun 199719 Jun 1997

Conference

ConferenceProceedings of the 1997 5th Israel Symposium on Theory of Computing and Systems, ISTCS
CityRamat-Gan, Isr
Period17/06/9719/06/97

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Private simultaneous messages protocols with applications'. Together they form a unique fingerprint.

Cite this