International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

An Information-Theoretic Approach for Secure Protocol Composition

Download
290 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_28,
        author={Yi-Ting Chiang and Tsan-Sheng Hsu and Churn-Jung Liau and Yun-Ching Liu and Chih-Hao Shen and Da-Wei Wang and Justin Zhan},
        title={An Information-Theoretic Approach for Secure Protocol Composition},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Privacy-preserving computation Secure multiparty computation Protocol composition},
        doi={10.1007/978-3-319-23829-6_28}
    }
    
  • Yi-Ting Chiang
    Tsan-Sheng Hsu
    Churn-Jung Liau
    Yun-Ching Liu
    Chih-Hao Shen
    Da-Wei Wang
    Justin Zhan
    Year: 2015
    An Information-Theoretic Approach for Secure Protocol Composition
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_28
Yi-Ting Chiang1,*, Tsan-Sheng Hsu1,*, Churn-Jung Liau1,*, Yun-Ching Liu2,*, Chih-Hao Shen3,*, Da-Wei Wang1,*, Justin Zhan4,*
  • 1: Academia Sinica
  • 2: University of Tokyo
  • 3: University of Virginia
  • 4: North Carolina Agricultural and Technical State University
*Contact email: ytchiang@iis.sinica.edu.tw, tshsu@iis.sinica.edu.tw, liaucj@iis.sinica.edu.tw, cipherman@gmail.com, shench@gmail.com, wdw@iis.sinica.edu.tw, justinzzhan@gmail.com

Abstract

Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach would be utilizing basic protocols as building blocks for the construction of complex protocol.