Quorum-based secure multi-party computation

被引:0
|
作者
Beaver, D [1 ]
Wool, A
机构
[1] IBM Corp, Transarc, Armonk, NY 10504 USA
[2] AT&T Bell Labs, Lucent Technol, Naperville, IL 60566 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturally-motivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general, and they have specific applicability to several problems in distributed control and management. The achievable limits of security in quorum-based multi-party computation are shown to be equivalent to those determined by Hirt and Maurer in [HM97], drawing a natural but non-obvious connection between quorum systems and the extremes of secure multi-party computation. Moreover, for both the general case and for specific applications, the protocols presented here are simpler and more efficient.
引用
收藏
页码:375 / 390
页数:16
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [3] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Gui-Ju Qu
    Ming-Ming Wang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 3003 - 3012
  • [4] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Qu, Gui-Ju
    Wang, Ming-Ming
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 3003 - 3012
  • [5] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [6] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [7] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [8] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [9] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [10] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381