Journal on Communications ›› 2015, Vol. 36 ›› Issue (2): 204-211.doi: 10.11959/j.issn.1000-436x.2015050

• Academic telecommunication • Previous Articles     Next Articles

Design for secure two-party computation protocol based on ElGamal variant’s homomorphic

Zhi-wei CHEN1,Juan-mei ZHANG2,Zi-chen LI2   

  1. 1 Data Communication Science &Technology Research Institute,Beijing 100191,China
    2 Department of Information Security,Beijing Electronic Science &Technology Institute,Beijing 100070,China
  • Online:2015-02-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities

Abstract:

ElGamal homomorphic characteristics were analyzed.In order to meet the need of protocol design,ElGamal variant was designed,which satisfies additive homomorphism and constant multiplication homomorphism.A homomorphism calculate protocol of linear equation passed by two private point based on the ElGamal variant was also proposed,then the correctness,security and the complexity of computation and communication of the protocol were analyzed to extend the application of thinking to secure two-party line segments intersection scheme.Compared with the similar protocol of solving the geometric problem,a kind of secure two-party computation protocol based on homomorphic encryption system without using the oblivious transfer protocol and the millionaires protocol was put forward,which holds higher efficiency and a lower burden of communication.

Key words: secure two-party computation, homomorphic encryption, ElGamal encryption system, private point cal-culation

No Suggested Reading articles found!