Detection of Cheaters in Non-interactive Polynomial Evaluation
نویسندگان
چکیده
In this paper, we consider both theoretical and practical aspects of robust NI-PE (noninteractive polynomial evaluation with detection of cheaters). First, we give a necessary condition of adversary structures for which perfectly robust NI-PE with small communication complexity exists. More precisely, we show that for any positive integers n, m and d > 1, an n-player access structure U , and an n-player adversary structure T , there exists a U-participating NI-PE scheme for m-variate polynomials over a finite field F with T -private inputs such that 1. perfectly robust (i.e., successful cheating probability 2 = 0), 2. any polynomial of degree d can be evaluated, 3. the total size of shares of the output for some participating set is o(m)× log |F|, only if T is of type Qd+1 for U , meaning that no d + 1 sets in T cover any set in U . Second, we give constructions of perfectly robust NI-PE schemes against threshold adversary and general adversary, respectively. All the proposed schemes ensure perfect robustness against Qd+1 adversary, and computability of arbitrary polynomial of degree d. Third, we show that efficient robust NI-PE schemes against general adversary can be constructed by allowing cheaters very small chance of successful cheating. Namely, we construct two robust NI-PE schemes with 2 = 1/|F| and the total size for shares of the output is only three times larger compared to the perfectly robust NI-PE scheme against threshold adversary.
منابع مشابه
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present very efficient unconditionally secure multiparty protocols based on pre-distributed data which generalize two-party computations based on linear pre-distributed bit commitments. The main ...
متن کاملPipelined algorithms to detect cheating in long-term grid computations
This paper studies pipelined algorithms for protecting distributed grid computations from cheating participants, who wish to be rewarded for tasks they receive but don’t perform. We present improved cheater detection algorithms that utilize natural delays that exist in long-term grid computations. In particular, we partition the sequence of grid tasks into two interleaved sequences of task roun...
متن کاملPolynomial evaluation groupoids and their groups
In this paper, we show how certain metabelian groups can be found within polynomial evaluation groupoids. We show that every finite abelian group can beobtained as a polynomial evaluation groupoid.
متن کاملA New Computer-Aided Detection System for Pulmonary Nodule in CT Scan Images of Cancerous Patients
Introduction: In the lung cancers, a computer-aided detection system that is capable of detecting very small glands in high volume of CT images is very useful.This study provided a novelsystem for detection of pulmonary nodules in CT image. Methods: In a case-control study, CT scans of the chest of 20 patients referred to Yazd Social Security Hospital were examined. In the two-dimensional and ...
متن کاملSimple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing Scheme
In this paper, we consider the problem of k-out-of-n secret sharing scheme, capable of identifying t cheaters. We design a very simple k-out-of-n secret sharing scheme, which can identify up to t cheaters, with probability at least 1 − ε, where 0 < ε < 1/2, provided t < k/2. This is the maximum number of cheaters, which can be identified by any k-out-of-n secret sharing scheme, capable of ident...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013