HEAL DSpace

Using simple disjoint decomposition to perform secure computations

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Sampson, M en
dc.contributor.author Voudouris, D en
dc.contributor.author Papakonstantinou, G en
dc.date.accessioned 2014-03-01T01:34:49Z
dc.date.available 2014-03-01T01:34:49Z
dc.date.issued 2010 en
dc.identifier.issn 0218-1266 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/20877
dc.subject ESCT en
dc.subject minimization en
dc.subject secure computations en
dc.subject simple disjoint decomposition en
dc.subject.classification Computer Science, Hardware & Architecture en
dc.subject.classification Engineering, Electrical & Electronic en
dc.subject.other Complex term en
dc.subject.other Cryptographic protocols en
dc.subject.other ESCT en
dc.subject.other Exclusive-OR en
dc.subject.other Function decomposition en
dc.subject.other Minimal model en
dc.subject.other minimization en
dc.subject.other Quantum algorithms en
dc.subject.other Secure computation en
dc.subject.other simple disjoint decomposition en
dc.subject.other Computation theory en
dc.subject.other Cryptography en
dc.subject.other Network security en
dc.subject.other Optimization en
dc.subject.other Quantum theory en
dc.subject.other Network protocols en
dc.title Using simple disjoint decomposition to perform secure computations en
heal.type journalArticle en
heal.identifier.primary 10.1142/S0218126610006906 en
heal.identifier.secondary http://dx.doi.org/10.1142/S0218126610006906 en
heal.language English en
heal.publicationDate 2010 en
heal.abstract This paper deals with the use of a minimal model for performing secure computations. The communication is based on a protocol which makes use of disjoint function decomposition and more precisely of minimal ESCT (Exclusive-or Sum of Complex Terms) expressions in order to perform a secure computation. The complexity of this protocol is directly proportional to the size of the ESCT expression in use, which is much smaller in comparison to other proposed minimal models (e.g., ESOP). Moreover, quantum algorithms are discussed that provide significant speedup to the process of producing the ESCT expressions, when compared to conventional ones. Hence, this paper provides a very useful application of the ESCT expressions in the field of cryptographic protocols. © 2010 World Scientific Publishing Company. en
heal.publisher WORLD SCIENTIFIC PUBL CO PTE LTD en
heal.journalName Journal of Circuits, Systems and Computers en
dc.identifier.doi 10.1142/S0218126610006906 en
dc.identifier.isi ISI:000283497100011 en
dc.identifier.volume 19 en
dc.identifier.issue 7 en
dc.identifier.spage 1559 en
dc.identifier.epage 1569 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής