Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2004, Vol. 21 ›› Issue (2): 179-184.DOI: 10.7523/j.issn.2095-6134.2004.2.006

Previous Articles     Next Articles

Secure Constant-Round Protocols for DeterminingCo-Prime of Polynomials

HE Yun-Xiao, XU Hai-Xia, LV Ke-Wei, LI Bao   

  1. State Key Lab. of Information Security, Graduate School, Chinese Academy of Sciences, Beijing 100039, China
  • Received:2003-03-11 Revised:2003-05-12 Online:2004-03-19

Abstract:

Based on some known constant-round protocols for generating random shared values,for secure multiplicationsand for addition of shared values,we give the Shamirs sharing for polynomials in a finite field K,and constructa protocol allowing a network to securely determine whether two polynomials in K[ x] are co-prime.Security ofthe protocols constructed depends on security of these basic protocols above.

Key words: multi-party secure computation, sharing, constant-round

CLC Number: