Skip to main content
Log in

Summing over a network without revealing summands

  • Part II Numerical Mathematics
  • Published:
BIT Numerical Mathematics Aims and scope Submit manuscript

Abstract

Consider a network in which each node possesses a secret member of a finite abelian group. In this paper we present a protocol by which the nodes can compute the sums of their secret elements without revealing them to each other. The security against discovery of the secret values as a result of conspiracies among nodes or compromise of channels between nodes is shown to depend on the connectivity of the graph defined by the network. Moreover, we are able to quantify exactly the amount of information revealed as a result of a conspiracy of a given set of nodes or compromise of a given set of channels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. C. Benaloh,Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, in Advances in Cryptology — Crypto '86, ed. A. Odlyzko, Springer-Verlag, Lecture Notes in Computer Science, vol. 263, New York, 1987.

  2. G. R. Blakley,Safeguarding Cryptographic Keys, in Proc. AFIPS 1979 National Computer Conference, pp. 313–317, New York, NY, June 1979.

  3. D. Chaum,The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol. 1, No. 1, pp. 65–75, 1988.

    Article  Google Scholar 

  4. J. Cohen,Improving Privacy in Cryptographic Elections, TR-454, Yale University, Department of Computer Science, New Haven, CT, Feb. 1986.

    Google Scholar 

  5. J. Cohen,Keeping Shares of a Secret Secret, TR-453, Yale University, Department of Computer Science, New Haven, CT, Feb. 1986.

    Google Scholar 

  6. E. D. Karnin, J. W. Greene, and M. E. Hellman,On secret sharing systems, IEEE Transactions on Information Theory, vol. IT-29, pp. 35–41, 1983.

    Google Scholar 

  7. S. Kothari,Generalized Linear Threshold Schemes, in Proceedings of Crypto '84, ed. G. R. Blakely and D. Chaum, pp. 231–241, Springer-Verlag, Lecture Notes in Computer Science, vol. 196, New York, 1985.

    Google Scholar 

  8. C. Meadows,Some threshold schemes without central key distributors, Congressus Numerantium, vol. 46, pp. 187–199, May, 1985.

  9. A. Shamir,How to share a secret, CACM, vol. 22, 11, pp. 169–179, Nov. 1979.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Meadows, C., Purdy, G. Summing over a network without revealing summands. BIT 29, 110–125 (1989). https://doi.org/10.1007/BF01932709

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01932709

CR classification

Keywords

Navigation