Back to Search
Start Over
USING SIMPLE DISJOINT DECOMPOSITION TO PERFORM SECURE COMPUTATIONS.
- Source :
-
Journal of Circuits, Systems & Computers . Nov2010, Vol. 19 Issue 7, p1559-1569. 11p. 3 Diagrams, 2 Charts. - Publication Year :
- 2010
-
Abstract
- This paper deals with the use of a minimal model for performing secure computations. The communication is based on a protocol which makes use of disjoint function decomposition and more precisely of minimal ESCT (Exclusive-or Sum of Complex Terms) expressions in order to perform a secure computation. The complexity of this protocol is directly proportional to the size of the ESCT expression in use, which is much smaller in comparison to other proposed minimal models (e.g., ESOP). Moreover, quantum algorithms are discussed that provide significant speedup to the process of producing the ESCT expressions, when compared to conventional ones. Hence, this paper provides a very useful application of the ESCT expressions in the field of cryptographic protocols. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 02181266
- Volume :
- 19
- Issue :
- 7
- Database :
- Academic Search Index
- Journal :
- Journal of Circuits, Systems & Computers
- Publication Type :
- Academic Journal
- Accession number :
- 54624357
- Full Text :
- https://doi.org/10.1142/S0218126610006906