Introduction
Secure Multiparty Computation from Graph Colouring
Ron Steinfeld Monash University July 2012
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 1/34
Secure Multiparty Computation from Graph Colouring Ron Steinfeld - - PowerPoint PPT Presentation
Introduction Secure Multiparty Computation from Graph Colouring Ron Steinfeld Monash University July 2012 Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 1/34 Introduction Acknowledgements Based on joint work
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 1/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 2/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 3/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 4/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 4/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 4/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 5/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 5/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 5/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 5/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 6/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 6/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 6/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 6/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 7/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 7/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 7/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 8/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 9/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 9/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 9/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 10/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 11/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 12/34
Introduction
y th share)
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 13/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 14/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 15/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 16/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 16/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 17/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 18/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 19/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 20/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 21/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 21/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 22/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 23/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 23/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 23/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 24/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 25/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 25/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 25/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 26/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 27/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 27/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 27/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 28/34
Introduction
1 Mult: (x, y) → x · y. 2 CMultα,β: x → α · x · β
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 29/34
Introduction
1 Mult: (x, y) → x · y. 2 CMultα,β: x → α · x · β
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 29/34
Introduction
1 Mult: (x, y) → x · y. 2 CMultα,β: x → α · x · β
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 29/34
Introduction
1 σ−1 2
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 30/34
Introduction
1 , yσ2, yσ−1 2 .
1 yσ−1 2
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 31/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 32/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 32/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 32/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 33/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 33/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 33/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 33/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 33/34
Introduction
Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 34/34