A New Efficient Secure Multi-party Computation

被引:0
|
作者
Tang Yonglong [1 ]
机构
[1] Jishou Univ, Sch Informat Adm & Engn, Zhangjiajie, Peoples R China
关键词
Cryptography; secure multi-party computation; existed secure multi-party computation;
D O I
10.4028/www.scientific.net/AMM.109.626
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In an existed multi-party computation protocol, any verifier must be a participant. A new secure multi-party computation among t participants and a verifier was proposed, in which the verifier no belong to participants can learn the final output. Our protocol is more practicable in some important situations, for example, in an electronic bidding, where an arbiter is only a verifier but is usually not a participant.
引用
收藏
页码:626 / 630
页数:5
相关论文
共 50 条
  • [1] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [2] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [3] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270
  • [4] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
  • [5] Round Efficient Computationally Secure Multi-party Computation Revisited
    Bangalore, Laasya
    Choudhury, Ashish
    Garimella, Gayathri
    [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 292 - 301
  • [6] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [7] Nearly universal and efficient quantum secure multi-party computation protocol
    Han Yushan
    Che Bichen
    Liu Jiali
    Dou Zhao
    Di Junyu
    [J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29 (04) : 51 - 68
  • [8] Concretely efficient secure multi-party computation protocols: survey and more
    Dengguo Feng
    Kang Yang
    [J]. Security and Safety, 2022, 1 (01) : 48 - 90
  • [9] Efficient Joint Random Number Generation for Secure Multi-party Computation
    Hoogerwerf, Erwin
    van Tetering, Daphne
    Bay, Asli
    Erkin, Zekeriya
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 436 - 443
  • [10] An efficient approach for secure multi-party computation without authenticated channel
    Duy-Hien Vu
    The-Dung Luong
    Tu-Bao Ho
    [J]. INFORMATION SCIENCES, 2020, 527 : 356 - 368