Quorum-based secure multi-party computation

被引:0
|
作者
Beaver, D [1 ]
Wool, A
机构
[1] IBM Corp, Transarc, Armonk, NY 10504 USA
[2] AT&T Bell Labs, Lucent Technol, Naperville, IL 60566 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturally-motivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general, and they have specific applicability to several problems in distributed control and management. The achievable limits of security in quorum-based multi-party computation are shown to be equivalent to those determined by Hirt and Maurer in [HM97], drawing a natural but non-obvious connection between quorum systems and the extremes of secure multi-party computation. Moreover, for both the general case and for specific applications, the protocols presented here are simpler and more efficient.
引用
收藏
页码:375 / 390
页数:16
相关论文
共 50 条
  • [21] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [22] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [23] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [24] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [25] Secure Multi-Party Computation Based on Cut-and-Choose Technology
    Zhao, Chuan
    Xu, Jun
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
  • [26] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    [J]. PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [27] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    [J]. PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [28] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
  • [29] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    [J]. BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [30] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899