Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results

Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

[img] PDF (Published Version) - Published Version
Restricted to Repository staff only

View at Publisher Website: https://doi.org/10.1007/s11390-022-0878-...


Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an evaluation f(alpha), of a sender, S's polynomial (f(x)), whilst keeping both ff and f(x) private. This protocol has attracted a lot of attention recently, as it has wide ranging applications in the field of cryptography. In this article we review some of these applications and, additionally, take an in-depth look at the special case of information theoretic OPE. Specifically, we provide a current and critical review of the existing information theoretic OPE protocols in the literature. We divide these protocols into two distinct cases (three-party and distributed OPE) allowing for the easy distinction and classification of future information theoretic OPE protocols. In addition to this work, we also develop several modifications and extensions to existing schemes, resulting in increased security, flexibility and efficiency. Lastly, we also identify a security flaw in a previously published OPE scheme.

Item ID: 74249
Item Type: Article (Research - C1)
ISSN: 1860-4749
Keywords: oblivious polynomial evaluation, unconditionally secure, information theoretic
Related URLs:
Copyright Information: © Institute of Computing Technology, Chinese Academy of Sciences 2022.
Additional Information:

A version of this publication was included as Chapter 5 of the following PhD thesis: Cianciullo, Louis (2022) Investigation of unconditionally secure multi-party computation. PhD thesis, James Cook University, which is available Open Access in ResearchOnline@JCU. Please see the Related URLs for access.

Date Deposited: 18 May 2022 07:32
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460401 Cryptography @ 70%
46 INFORMATION AND COMPUTING SCIENCES > 4613 Theory of computation > 461301 Coding, information theory and compression @ 30%
SEO Codes: 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 50%
22 INFORMATION AND COMMUNICATION SERVICES > 2201 Communication technologies, systems and services > 220104 Network security @ 50%
Downloads: Total: 1
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page