Secure multi-party computation protocol for sequencing problem

被引:10
|
作者
Tang ChunMing [1 ,2 ]
Shi GuiHua [1 ]
Yao ZhengAn [3 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software Sci, Beijing 100080, Peoples R China
[3] Sun Yat Sen Univ, Sch Math & Computat Sci, Guangzhou 510275, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
secure multi-party computation; sequencing problem; secret sharing;
D O I
10.1007/s11432-011-4272-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t a (c) 1/2 (n - 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires' problem.
引用
收藏
页码:1654 / 1662
页数:9
相关论文
共 50 条
  • [31] Arithmetic cryptography protocol for secure multi-party computation (non-refereed)
    Mishra, Durgesh Kumar
    Chandwani, Manohar
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 22 - 22
  • [32] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [33] Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation
    Rao, Ch Koteswara
    Singh, Kunwar
    Kumar, Anoop
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2021, 27 (01) : 67 - 82
  • [34] Secure Multi-party Comparison Protocol and Application
    Zhang, Jing
    Luo, Shoushan
    Yang, Yixian
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 292 - 304
  • [35] A secure multi-party computation protocol without CRS supporting multi-bit encryption
    Zhu, Zong-Wu
    Huang, Ru-Wei
    [J]. PLOS ONE, 2022, 17 (03):
  • [36] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    [J]. BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [37] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    [J]. Journal of Cryptology, 2005, 18 : 37 - 61
  • [38] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [39] Round-Optimal Secure Multi-party Computation
    Shai Halevi
    Carmit Hazay
    Antigoni Polychroniadou
    Muthuramakrishnan Venkitasubramaniam
    [J]. Journal of Cryptology, 2021, 34
  • [40] A Zero-Hacking Protocol for Secure Multi-party Computation Using Multiple TTP
    Mishra, Durgesh Kumar
    Chandwani, Manohar
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 2044 - +