The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Nous proposons un protocole permettant de convertir la fonction de chiffrement d'un texte chiffré en une autre fonction de chiffrement tout en gardant secret le message correspondant. Le protocole proposé permet des conversions des cryptosystèmes El Gamal et Paillier et a le potentiel de concevoir un protocole multipartite efficace destiné aux circuits constitués d'opérations arithmétiques et logiques. Nous clarifions l'état des circuits de telle sorte que le protocole multipartite basé sur le protocole proposé offre de meilleures performances que les approches précédentes. De plus, nous introduisons certains calculs statistiques préservant la confidentialité comme application efficace du protocole proposé.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Koji CHIDA, Hiroaki KIKUCHI, Keiichi HIROTA, Gembu MOROHASHI, "Multiparty Computation from El Gamal/Paillier Conversion" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 1, pp. 137-146, January 2009, doi: 10.1587/transfun.E92.A.137.
Abstract: We propose a protocol for converting the encryption function of a ciphertext into another encryption function while keeping the corresponding message secret. The proposed protocol allows conversions of the El Gamal and Paillier cryptosystems and has the potential to design an efficient multiparty protocol intended for circuits consisting of arithmetic and logical operations. We clarify the condition of circuits such that the multiparty protocol based on the proposed protocol provides better performance than previous approaches. In addition, we introduce some privacy-preserving statistical computations as an effective application of the proposed protocol.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.137/_p
Copier
@ARTICLE{e92-a_1_137,
author={Koji CHIDA, Hiroaki KIKUCHI, Keiichi HIROTA, Gembu MOROHASHI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Multiparty Computation from El Gamal/Paillier Conversion},
year={2009},
volume={E92-A},
number={1},
pages={137-146},
abstract={We propose a protocol for converting the encryption function of a ciphertext into another encryption function while keeping the corresponding message secret. The proposed protocol allows conversions of the El Gamal and Paillier cryptosystems and has the potential to design an efficient multiparty protocol intended for circuits consisting of arithmetic and logical operations. We clarify the condition of circuits such that the multiparty protocol based on the proposed protocol provides better performance than previous approaches. In addition, we introduce some privacy-preserving statistical computations as an effective application of the proposed protocol.},
keywords={},
doi={10.1587/transfun.E92.A.137},
ISSN={1745-1337},
month={January},}
Copier
TY - JOUR
TI - Multiparty Computation from El Gamal/Paillier Conversion
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 137
EP - 146
AU - Koji CHIDA
AU - Hiroaki KIKUCHI
AU - Keiichi HIROTA
AU - Gembu MOROHASHI
PY - 2009
DO - 10.1587/transfun.E92.A.137
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2009
AB - We propose a protocol for converting the encryption function of a ciphertext into another encryption function while keeping the corresponding message secret. The proposed protocol allows conversions of the El Gamal and Paillier cryptosystems and has the potential to design an efficient multiparty protocol intended for circuits consisting of arithmetic and logical operations. We clarify the condition of circuits such that the multiparty protocol based on the proposed protocol provides better performance than previous approaches. In addition, we introduce some privacy-preserving statistical computations as an effective application of the proposed protocol.
ER -