22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

z i<br />

P 2<br />

Q 1<br />

y i<br />

P 1<br />

s 1 r 1<br />

x i<br />

w i<br />

z i w i<br />

x i y i<br />

s 3 r 3 s 4 r 4<br />

s 2<br />

Q 2<br />

r 2<br />

z 1 w 1 z 2 w 2<br />

s i r i s i r i<br />

S<br />

x i y i x i y i<br />

S ′<br />

z 3 w 3 z 4 w 4<br />

N<br />

G<br />

Figure 4: Protocol composition. Security is proved using a hybrid argument.<br />

z i w i z i w i s i r i s i r i<br />

Q 1 Q 2 S<br />

x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4<br />

F<br />

Figure 5: Hybrid system to prove the security of the composed protocol<br />

6<br />

12. An Equational Approach to Secure Multi-party Computation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!