Abstract
Consider a network in which each node possesses a secret member of a finite abelian group. In this paper we present a protocol by which the nodes can compute the sums of their secret elements without revealing them to each other. The security against discovery of the secret values as a result of conspiracies among nodes or compromise of channels between nodes is shown to depend on the connectivity of the graph defined by the network. Moreover, we are able to quantify exactly the amount of information revealed as a result of a conspiracy of a given set of nodes or compromise of a given set of channels.
Similar content being viewed by others
References
J. C. Benaloh,Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, in Advances in Cryptology — Crypto '86, ed. A. Odlyzko, Springer-Verlag, Lecture Notes in Computer Science, vol. 263, New York, 1987.
G. R. Blakley,Safeguarding Cryptographic Keys, in Proc. AFIPS 1979 National Computer Conference, pp. 313–317, New York, NY, June 1979.
D. Chaum,The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol. 1, No. 1, pp. 65–75, 1988.
J. Cohen,Improving Privacy in Cryptographic Elections, TR-454, Yale University, Department of Computer Science, New Haven, CT, Feb. 1986.
J. Cohen,Keeping Shares of a Secret Secret, TR-453, Yale University, Department of Computer Science, New Haven, CT, Feb. 1986.
E. D. Karnin, J. W. Greene, and M. E. Hellman,On secret sharing systems, IEEE Transactions on Information Theory, vol. IT-29, pp. 35–41, 1983.
S. Kothari,Generalized Linear Threshold Schemes, in Proceedings of Crypto '84, ed. G. R. Blakely and D. Chaum, pp. 231–241, Springer-Verlag, Lecture Notes in Computer Science, vol. 196, New York, 1985.
C. Meadows,Some threshold schemes without central key distributors, Congressus Numerantium, vol. 46, pp. 187–199, May, 1985.
A. Shamir,How to share a secret, CACM, vol. 22, 11, pp. 169–179, Nov. 1979.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Meadows, C., Purdy, G. Summing over a network without revealing summands. BIT 29, 110–125 (1989). https://doi.org/10.1007/BF01932709
Issue Date:
DOI: https://doi.org/10.1007/BF01932709