Design for secure two-party computation protocol based on ElGamal variant’s homomorphic

ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElG...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhi-wei CHEN, Juan-mei ZHANG, Zi-chen LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015050/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850095572282769408
author Zhi-wei CHEN
Juan-mei ZHANG
Zi-chen LI
author_facet Zhi-wei CHEN
Juan-mei ZHANG
Zi-chen LI
author_sort Zhi-wei CHEN
collection DOAJ
description ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElGamal variant was also proposed,then the correctness,security and the complexity of computation and communication of the protocol were analyzed to extend the application of thinking to secure two-party line segments intersection scheme.Compared with the similar protocol of solving the geometric problem,a kind of secure two-party computation protocol based on homomorphic encryption system without using the oblivious transfer protocol and the millionaires protocol was put forward,which holds higher efficiency and a lower burden of communication.
format Article
id doaj-art-b5038afa2da94dda954211b775c554bc
institution DOAJ
issn 1000-436X
language zho
publishDate 2015-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b5038afa2da94dda954211b775c554bc2025-08-20T02:41:24ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-02-013620421159692024Design for secure two-party computation protocol based on ElGamal variant’s homomorphicZhi-wei CHENJuan-mei ZHANGZi-chen LIElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElGamal variant was also proposed,then the correctness,security and the complexity of computation and communication of the protocol were analyzed to extend the application of thinking to secure two-party line segments intersection scheme.Compared with the similar protocol of solving the geometric problem,a kind of secure two-party computation protocol based on homomorphic encryption system without using the oblivious transfer protocol and the millionaires protocol was put forward,which holds higher efficiency and a lower burden of communication.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015050/secure two-party computationhomomorphic encryptionElGamal encryption systemprivate point cal-culation
spellingShingle Zhi-wei CHEN
Juan-mei ZHANG
Zi-chen LI
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Tongxin xuebao
secure two-party computation
homomorphic encryption
ElGamal encryption system
private point cal-culation
title Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
title_full Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
title_fullStr Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
title_full_unstemmed Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
title_short Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
title_sort design for secure two party computation protocol based on elgamal variant s homomorphic
topic secure two-party computation
homomorphic encryption
ElGamal encryption system
private point cal-culation
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015050/
work_keys_str_mv AT zhiweichen designforsecuretwopartycomputationprotocolbasedonelgamalvariantshomomorphic
AT juanmeizhang designforsecuretwopartycomputationprotocolbasedonelgamalvariantshomomorphic
AT zichenli designforsecuretwopartycomputationprotocolbasedonelgamalvariantshomomorphic