A New Efficient Secure Multi-party Computation

被引:0
|
作者
Tang Yonglong [1 ]
机构
[1] Jishou Univ, Sch Informat Adm & Engn, Zhangjiajie, Peoples R China
关键词
Cryptography; secure multi-party computation; existed secure multi-party computation;
D O I
10.4028/www.scientific.net/AMM.109.626
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In an existed multi-party computation protocol, any verifier must be a participant. A new secure multi-party computation among t participants and a verifier was proposed, in which the verifier no belong to participants can learn the final output. Our protocol is more practicable in some important situations, for example, in an electronic bidding, where an arbiter is only a verifier but is usually not a participant.
引用
收藏
页码:626 / 630
页数:5
相关论文
共 50 条
  • [31] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    [J]. PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [32] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    [J]. BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [33] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    [J]. Journal of Cryptology, 2005, 18 : 37 - 61
  • [34] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [35] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [36] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [37] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [38] Round-Optimal Secure Multi-party Computation
    Shai Halevi
    Carmit Hazay
    Antigoni Polychroniadou
    Muthuramakrishnan Venkitasubramaniam
    [J]. Journal of Cryptology, 2021, 34
  • [39] Secure Multi-party Quantum Computation with a Dishonest Majority
    Dulek, Yfke
    Grilo, Alex B.
    Jeffery, Stacey
    Majenz, Christian
    Schaffner, Christian
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 729 - 758
  • [40] Minimal complete primitives for secure multi-party computation
    Fitzi, M
    Garay, JA
    Maurer, U
    Ostrovsky, R
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (01) : 37 - 61