Abstract
We introduce a new tentative protocol for secure two-party computation of linear functions in the semi-honest model, based on coding techniques. We first establish a parallel between the second version of the wire-tap channel model and secure two-party computation. This leads us to our protocol, that combines linear coset coding and oblivious transfer techniques. Our construction requires the use of binary intersecting codes or \(q\)-ary minimal codes, which are also studied in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashikhmin, A.E., Barg, A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44(5), 2010–2017 (1998)
Bonisoli, A.: Every equidistant linear code is a sequence of dual hamming codes. Ars Comb. 18, 181–186 (1984)
Brassard, G., Crépeau, C., Santha, M.: Oblivious transfers and intersecting codes. IEEE Trans. Inf. Theory 42(6), 1769–1780 (1996)
Bringer, J., Chabanne, H., Patey, A.: SHADE: Secure HAmming DistancE computation from oblivious transfer. In: Workshop on Applied Homomorphic Cryptography (WAHC) (2013)
Cohen, G.D., Mesnager, S., Patey, A.: On minimal and quasi-minimal linear codes. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 85–98. Springer, Heidelberg (2013)
Cohen, G.D., Lempel, A.: Linear intersecting codes. Discret. Math. 56(1), 35–43 (1985)
Cohen, G.D., Litsyn, S., Zémor, G.: Upper bounds on generalized distances. IEEE Trans. Inf. Theory 40(6), 2090–2092 (1994)
Cohen, G.D., Zémor, G.: Intersecting codes and independent families. IEEE Trans. Inf. Theory 40(6), 1872–1881 (1994)
Cramer, R., Damgard, I., Nielsen, J.B.: Secure multiparty computation and secret sharing - an information theoretic approach, Book Draft (2012)
Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude, C.S., Dinneen, M.J., Vajnovszki, V. (eds.) DMTCS 2003. LNCS, vol. 2731, pp. 11–25. Springer, Heidelberg (2003)
Encheva, S.B., Cohen, G.D.: Constructions of intersecting codes. IEEE Trans. Inf. Theory 45(4), 1234–1237 (1999)
Goldreich, O.: The Foundations of Cryptography - vol. 2, Basic Applications. Cambridge University Press, Cambridge (2004)
Guo, Y., Li, Z., Lai, H.: A novel dynamic and verifiable secret sharing scheme based on linear codes. J. Shaanxi Normal Univ. (Nat. Sci. Ed.), 4, 013 (2010)
Hazay, C., Lindell, Y.: Efficient Secure Two-Party Protocols. Springer, Heidelberg (2010)
Lindell, Y., Pinkas, B.: A proof of security of Yao’s protocol for two-party computation. J. Cryptol. 22(2), 161–188 (2009)
Lipmaa, H.: Oblivious transfer or private information retrieval. http://www.cs.ut.ee/~lipmaa/crypto/link/protocols/oblivious.php
Ozarow, L.H., Wyner, A.D.: Wire-tap channel II. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 33–50. Springer, Heidelberg (1985)
Rabin, M.O.: How to exchange secrets with oblivious transfer. Technical report TR-81, Aiken Computation Lab, Harvard University (1981)
Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229–244. Springer, Heidelberg (2010)
Schneider, T.: Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer, Heidelberg (2012)
Sloane, N.J.A.: Covering arrays and intersecting codes. J. Comb. Des. 1, 51–63 (1993)
Song, Y., Li, Z.: Secret sharing with a class of minimal linear codes. CoRR, abs/1202.4058 (2012)
Wei, V.K.-W.: Generalized hamming weights for linear codes. IEEE Trans. Inf. Theory 37(5), 1412–1418 (1991)
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162–167. IEEE Computer Society (1986)
Acknowledgements
This work has been partially funded by the ANR SecuLar project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Chabanne, H., Cohen, G., Patey, A. (2014). Towards Secure Two-Party Computation from the Wire-Tap Channel. In: Lee, HS., Han, DG. (eds) Information Security and Cryptology -- ICISC 2013. ICISC 2013. Lecture Notes in Computer Science(), vol 8565. Springer, Cham. https://doi.org/10.1007/978-3-319-12160-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-12160-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12159-8
Online ISBN: 978-3-319-12160-4
eBook Packages: Computer ScienceComputer Science (R0)