Hi Martin
Thanks for your prompt reply. Much appreciated :)
If anyone on the list has any further pointers, I will be grateful for your
response.
Thanks in advance
Kind Regards
Sriram
From: m...@mgsys.dk [...@mgsys.dk] On Behalf Of Martin Geisler
[...@lazybytes.net]
Sent: 23 April 2010 18:04
To: Srinivasan S Mr (Computing); viff-devel@viff.dk
Subject: Re: My dissertation
s.sriniva...@surrey.ac.uk writes:
Hi Sriram,
I'll CC this message to the VIFF mailinglist as well -- there are many
people there who can help you if I cannot. Please keep the list as CC on
your replies.
Hi Martin
I hope you have settled into your new workplace and enjoying yourself.
Thanks, it's going well in my new job.
I had a few quick queries if you don't mind.
I have been trying to get a grasp on MPC ideas over the past few days.
I was wondering if you could point me a recent comprehensive, but not
too heavy survey on MPC. If I could get an idea of how the field has
progressed and various approaches to achieving MPC without getting
bogged down in too much detail, it may be helpful for me at this
stage.
I don't know of such a survey off the top of my head.
As I understand, VIFF implements the underlying functionality using
Shamir Secret Sharing. It seems there are other approaches possible as
well and one of my colleagues wanted to know if VIFF also implements
the ideas from the paper Multiparty Computation from Threshold
Homomorphic Encryption by Ronald Cramer and Ivan Damgard and Jesper
Buus Nielsen? My guess is No, but I am not not sure.
Right, we have not implemented the protocols from that paper.
There are some papers that refer to this latter work, for example
Efficient Binary Conversion for Paillier Encrypted Values by Berry
Schoenmakers and Pim Tuyls. I was wondering if the application in
this paper can be coded with the functionality provided by VIFF in
principle, or there are some details which may prevent it from being
so.
I'm sorry, but I'm not familiar with that paper. But you should think of
VIFF as having a number of layers:
1. basic player administration
2. network setup
3. secret sharing and reconstruction (Shamir-based)
4. secure addition and multiplication
5. more complex protocols
So depending on how the primitive above fits into the stack, you may be
able to reuse more or less code.
Sorry if my queries don't make sense. I can admit I don't have much
knowledge of the details and I am trying pick up stuff as I go along.
Thanks in advance.
Best Wishes
Sriram
--
Martin Geisler
___
viff-devel mailing list (http://viff.dk/)
viff-devel@viff.dk
http://lists.viff.dk/listinfo.cgi/viff-devel-viff.dk