Secure multiparty computation in cloud computing

被引:0
作者
Jiang H. [1 ]
Xu Q. [1 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2016年 / 53卷 / 10期
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud-assisted secure multiparty computation; Secure multiparty computation; Secure outsourced computation;
D O I
10.7544/issn1000-1239.2016.20160685
中图分类号
学科分类号
摘要
The emergence and rapid development of cloud computing structurally change the computation models of secure multi-party computation. In cloud environment, the computation task, the participants and the external environment of secure multi-party computation are becoming diversified and complicated. Using huge cloud resources to design and implement the secure multi-party computation protocol becomes a new research area. Cloud computing provides the resources to implement secure multi-party computation protocols, meanwhile, it also brings new challenge. In this paper, a survey for generalmulti-party computation in cloud setting, as well as some specific cloud-based secure multi-party computation protocols are given. Also, our opinions of the problem in the current researches and the directions for future works on multi-party computation in cloud setting are proposed. © 2016, Science Press. All right reserved.
引用
收藏
页码:2152 / 2162
页数:10
相关论文
共 37 条
  • [21] Freedman M.J., Nissim K., Pinkas B., Efficient private matching and set intersection, Proc of the 2004 Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 1-19, (2004)
  • [22] Kerschbaum F., Collusion-resistant outsourcing of private set intersection, Proc of the 27th Annual ACM Symp on Applied Computing, pp. 1451-1456, (2012)
  • [23] Kerschbaum F., Outsourced private set intersection using homomorphic encryption, Proc of the 7th ACM Symp on Information, Computer and Communications Security, pp. 85-86, (2012)
  • [24] Liu F., Ng W.K., Zhang W., Et al., Encrypted set intersection protocol for outsourced datasets, Proc of the 2014 IEEE Int Conf on Cloud Engineering (IC2E), pp. 135-140, (2014)
  • [25] Zheng Q., Xu S., Verifiable delegated set intersection operations on outsourced encrypted data, Proc of the 2015 IEEE Int Conf on Cloud Engineering (IC2E), pp. 175-184, (2015)
  • [26] Kamara S., Mohassel P., Raykova M., Et al., Scaling private set intersection to billion-element sets, Proc of the 2014 Int Conf on Financial Cryptography and Data Security, pp. 195-215, (2014)
  • [27] Abadi A., Terzis S., Dong C., O-PSI: Delegated private set intersection on outsourced datasets, Proc of the 2015 IFIP Int Information Security Conf, pp. 3-17, (2015)
  • [28] Chor B., Goldreich O., Kushilevitz E., Et al., Private information retrieval, Proc of the 36th Annual Symp on Foundations of Computer Science, (1995)
  • [29] Olumofin F., Goldberg I., Revisiting the computational practicality of private information retrieval, Proc of the 2011 Int Conf on Financial Cryptography and Data Security, pp. 158-172, (2011)
  • [30] Dean J., Ghemawat S., MapReduce: Simplified data processing on large clusters, Proc of the 6th Symp on Operating System Design and Implementation, pp. 107-113, (2004)