# Protocols for secure computations

@article{Yao1982ProtocolsFS, title={Protocols for secure computations}, author={A. Yao}, journal={23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)}, year={1982}, pages={160-164} }

The author investigates the following problem: Suppose m people wish to compute the value of a function f(x1, x2, x3, ..., xm), which is an integer-valued function of m integer variables xi of bounded range. Assume initially person Pi knows the value of xi and no other x's. Is it possible for them to compute the value of f, by communicating among themselves, without unduly giving away any information about the values of their own variables? The author gives a precise formulation of this general… Expand

#### Topics from this paper

#### 11 Citations

A novel quantum solution to secure two-party distance computation

- Computer Science
- Quantum Inf. Process.
- 2018

Lower bounds and optimal protocols for three-party secure computation

- Computer Science
- 2016 IEEE International Symposium on Information Theory (ISIT)
- 2016

Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing

- Mathematics, Computer Science
- CRYPTO
- 1986

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

- Computer Science
- CRYPTO
- 2018

#### References

SHOWING 1-10 OF 12 REFERENCES

Some complexity questions related to distributive computing(Preliminary Report)

- Computer Science, Mathematics
- STOC
- 1979

A method for obtaining digital signatures and public-key cryptosystems

- Computer Science
- CACM
- 1978

Probabilistic encryption & how to play mental poker keeping secret all partial information

- Computer Science
- STOC '82
- 1982

14th ACM Symp. on Theory of Computing

- 14th ACM Symp. on Theory of Computing
- 1982

Three applications of the oblivious transfer

- 1981, to appear.
- 1981

Three applications of the oblivious transfer: Part I: Coin flipping by telephone; part II: How to exchange secrets; part III: How to send certified electronic mail

- Technical report,
- 1981

Mental poker

- Technical Report LCS/TR-125,
- 1979

Hellman , " New directions in cryptography , " IEEE Trans . on Inform

- Theory IT -
- 1976