Using simple disjoint decomposition to perform secure computations

see the original item page
in the repository's web site and access all digital files if the item*



Using simple disjoint decomposition to perform secure computations (EN)

Voudouris, D (EN)
Papakonstantinou, G (EN)
Sampson, M (EN)

journalArticle (EN)

2014-03-01T01:34:49Z
2010 (EN)


This paper deals with the use of a minimal model for performing secure computations. The communication is based on a protocol which makes use of disjoint function decomposition and more precisely of minimal ESCT (Exclusive-or Sum of Complex Terms) expressions in order to perform a secure computation. The complexity of this protocol is directly proportional to the size of the ESCT expression in use, which is much smaller in comparison to other proposed minimal models (e.g., ESOP). Moreover, quantum algorithms are discussed that provide significant speedup to the process of producing the ESCT expressions, when compared to conventional ones. Hence, this paper provides a very useful application of the ESCT expressions in the field of cryptographic protocols. © 2010 World Scientific Publishing Company. (EN)

Engineering, Electrical & Electronic (EN)
Computer Science, Hardware & Architecture (EN)

Network protocols (EN)
Minimal model (EN)
secure computations (EN)
Network security (EN)
Complex term (EN)
Secure computation (EN)
Optimization (EN)
Cryptographic protocols (EN)
Function decomposition (EN)
Quantum algorithms (EN)
minimization (EN)
simple disjoint decomposition (EN)
Computation theory (EN)
Exclusive-OR (EN)
Cryptography (EN)
Quantum theory (EN)
ESCT (EN)

Journal of Circuits, Systems and Computers (EN)

English

WORLD SCIENTIFIC PUBL CO PTE LTD (EN)




*Institutions are responsible for keeping their URLs functional (digital file, item page in repository site)