A New Efficient Secure Multi-party Computation

被引:0
|
作者
Tang Yonglong [1 ]
机构
[1] Jishou Univ, Sch Informat Adm & Engn, Zhangjiajie, Peoples R China
关键词
Cryptography; secure multi-party computation; existed secure multi-party computation;
D O I
10.4028/www.scientific.net/AMM.109.626
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In an existed multi-party computation protocol, any verifier must be a participant. A new secure multi-party computation among t participants and a verifier was proposed, in which the verifier no belong to participants can learn the final output. Our protocol is more practicable in some important situations, for example, in an electronic bidding, where an arbiter is only a verifier but is usually not a participant.
引用
收藏
页码:626 / 630
页数:5
相关论文
共 50 条
  • [41] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899
  • [42] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [43] Secure Multi-Party Computation with Service Contract Automata
    Basile, Davide
    [J]. ERCIM NEWS, 2021, (126): : 32 - 33
  • [44] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390
  • [45] Secure Multi-Party Computation Using Polarizing Cards
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Schuldt, Jacob
    Nuida, Koji
    Kanayama, Naoki
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 281 - 297
  • [46] Conclave: secure multi-party computation on big data
    Volgushev, Nikolaj
    Schwarzkopf, Matte
    Ben Getchell
    Varia, Mayank
    Lapets, Andrei
    Bestavros, Azer
    [J]. PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [47] SECURE MULTI-PARTY QUANTUM CONFERENCE AND XOR COMPUTATION
    Das, Nayana
    Paul, Goutam
    [J]. QUANTUM INFORMATION & COMPUTATION, 2021, 21 (3-4) : 203 - 232
  • [48] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [49] Secure Multi-party Computation Minimizing Online Rounds
    Choi, Seung Geol
    Elbaz, Ariel
    Malkin, Tal
    Yung, Moti
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 268 - 286
  • [50] Secure Key Management for Multi-Party Computation in MOZAIK
    Marque, Enzo
    Moeyersons, Jerico
    Pohle, Erik
    Van Kenhove, Michiel
    Abidin, Aysajan
    Volckaert, Bruno
    [J]. 2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 133 - 140