Secure multi-party computation protocol for sequencing problem

被引:0
|
作者
ChunMing Tang
GuiHua Shi
ZhengAn Yao
机构
[1] Guangzhou University,School of Mathematics and Information Science
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Software Science
[3] Sun Yat-Sen University,School of Mathematics and Computational Science
来源
关键词
secure multi-party computation; sequencing problem; secret sharing;
D O I
暂无
中图分类号
学科分类号
摘要
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t ⩽ (n − 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires’ problem.
引用
收藏
页码:1654 / 1662
页数:8
相关论文
共 50 条
  • [1] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [2] Secure multi-party computation protocol for sequencing problem
    TANG ChunMing 1
    2State Key Laboratory of Information Security
    3 School of Mathematics and Computational Science
    Science China(Information Sciences), 2011, 54 (08) : 1654 - 1662
  • [3] Secure multi-party computation protocol for sorting problem
    School of Computer Science, Shaanxi Normal University, Xi'an 710062, China
    不详
    Hsi An Chiao Tung Ta Hsueh, 2008, 2 (231-233+255): : 231 - 233
  • [4] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [5] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    Quantum Information Processing, 2018, 17
  • [6] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [7] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [8] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [9] Secure Multi-Party Computation Protocol Using Asymmetric Encryption
    Shukla, Samiksha
    Sadashivappa, G.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 780 - 785
  • [10] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210