Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 5 von 76459
Wireless communications and mobile computing, 2023, Vol.2023, p.1-26
2023
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Efficient Secure Computation from SM Series Cryptography
Ist Teil von
  • Wireless communications and mobile computing, 2023, Vol.2023, p.1-26
Ort / Verlag
Oxford: Hindawi
Erscheinungsjahr
2023
Quelle
EZB Free E-Journals
Beschreibungen/Notizen
  • The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure computation ensures the execution security in such an environment, and compared with computation on the plaintext, the performance of secure computation is bounded by the underlying cryptographic algorithms and the network environment between the involved parties. Besides, the Chinese cryptography laws require the cryptographic algorithms that appeared in the commercial market to be authorized. In this work, we show how to implement oblivious transfer (OT), an important primitive in secure multiparty computation (MPC), using the Chinese government-approved SM2 and SM3 algorithms. The SM2 algorithm is based on the elliptic curve cryptography and is much faster than the discrete logarithm-based solutions. Moreover, by adopting the standard OT extension technique, we can extend the number of OTs efficiently with one more round of communication and invocations to the SM3 and SM4 algorithms. The OT primitive can be used in the Beaver multiplication triple generation and other MPC protocols, e.g., private set intersection. Therefore, we can utilize the SM series cryptography, specifically, the SM2, SM3, and SM4 algorithms, to build highly efficient secure computation frameworks which are suitable for the wireless network environment and for commercial applications in China. The experimental evaluation results show that our protocols have comparable performance to existing protocols; specifically, our protocols are quite suitable for bad network environments.
Sprache
Englisch
Identifikatoren
ISSN: 1530-8669
eISSN: 1530-8677
DOI: 10.1155/2023/6039034
Titel-ID: cdi_proquest_journals_2819898478

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX