dc.contributor.author |
Sampson, M |
en |
dc.contributor.author |
Voudouris, D |
en |
dc.contributor.author |
Papakonstantinou, G |
en |
dc.date.accessioned |
2014-03-01T01:34:49Z |
|
dc.date.available |
2014-03-01T01:34:49Z |
|
dc.date.issued |
2010 |
en |
dc.identifier.issn |
0218-1266 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/20877 |
|
dc.subject |
ESCT |
en |
dc.subject |
minimization |
en |
dc.subject |
secure computations |
en |
dc.subject |
simple disjoint decomposition |
en |
dc.subject.classification |
Computer Science, Hardware & Architecture |
en |
dc.subject.classification |
Engineering, Electrical & Electronic |
en |
dc.subject.other |
Complex term |
en |
dc.subject.other |
Cryptographic protocols |
en |
dc.subject.other |
ESCT |
en |
dc.subject.other |
Exclusive-OR |
en |
dc.subject.other |
Function decomposition |
en |
dc.subject.other |
Minimal model |
en |
dc.subject.other |
minimization |
en |
dc.subject.other |
Quantum algorithms |
en |
dc.subject.other |
Secure computation |
en |
dc.subject.other |
simple disjoint decomposition |
en |
dc.subject.other |
Computation theory |
en |
dc.subject.other |
Cryptography |
en |
dc.subject.other |
Network security |
en |
dc.subject.other |
Optimization |
en |
dc.subject.other |
Quantum theory |
en |
dc.subject.other |
Network protocols |
en |
dc.title |
Using simple disjoint decomposition to perform secure computations |
en |
heal.type |
journalArticle |
en |
heal.identifier.primary |
10.1142/S0218126610006906 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1142/S0218126610006906 |
en |
heal.language |
English |
en |
heal.publicationDate |
2010 |
en |
heal.abstract |
This paper deals with the use of a minimal model for performing secure computations. The communication is based on a protocol which makes use of disjoint function decomposition and more precisely of minimal ESCT (Exclusive-or Sum of Complex Terms) expressions in order to perform a secure computation. The complexity of this protocol is directly proportional to the size of the ESCT expression in use, which is much smaller in comparison to other proposed minimal models (e.g., ESOP). Moreover, quantum algorithms are discussed that provide significant speedup to the process of producing the ESCT expressions, when compared to conventional ones. Hence, this paper provides a very useful application of the ESCT expressions in the field of cryptographic protocols. © 2010 World Scientific Publishing Company. |
en |
heal.publisher |
WORLD SCIENTIFIC PUBL CO PTE LTD |
en |
heal.journalName |
Journal of Circuits, Systems and Computers |
en |
dc.identifier.doi |
10.1142/S0218126610006906 |
en |
dc.identifier.isi |
ISI:000283497100011 |
en |
dc.identifier.volume |
19 |
en |
dc.identifier.issue |
7 |
en |
dc.identifier.spage |
1559 |
en |
dc.identifier.epage |
1569 |
en |