Secure multi-party computation protocol for sequencing problem

被引:0
作者
TANG ChunMing SHI GuiHua YAO ZhengAn School of Mathematics and Information ScienceGuangzhou UniversityGuangzhou ChinaState Key Laboratory of Information Security Institute of Software ScienceChinese Academy of SciencesBeijing China School of Mathematics and Computational ScienceSun YatSen UniversityGuangzhou China [1 ,2 ,1 ,3 ,1 ,510006 ,2 ,100080 ,3 ,510275 ]
机构
关键词
secure multi-party computation; sequencing problem; secret sharing;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems.In the present study,we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems.Our protocols are perfectly secure against both a passive adversary that can corrupt at most t (n-1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants.The simplest sequencing problem is the Millionaires' problem.
引用
收藏
页码:1654 / 1662
页数:9
相关论文
共 4 条
[1]   无信息泄漏的比较协议 [J].
秦静 ;
张振峰 ;
冯登国 ;
李宝 .
软件学报, 2004, (03) :421-427
[2]   A Proof of Security of Yao's Protocol for Two-Party Computation [J].
Lindell, Yehuda ;
Pinkas, Benny .
JOURNAL OF CRYPTOLOGY, 2009, 22 (02) :161-188
[3]   Comparing information without leaking it [J].
Fagin, R ;
Naor, M ;
Winkler, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (05) :77-85
[4]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613