Quorum-based secure multi-party computation

被引:0
|
作者
Beaver, D [1 ]
Wool, A
机构
[1] IBM Corp, Transarc, Armonk, NY 10504 USA
[2] AT&T Bell Labs, Lucent Technol, Naperville, IL 60566 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturally-motivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general, and they have specific applicability to several problems in distributed control and management. The achievable limits of security in quorum-based multi-party computation are shown to be equivalent to those determined by Hirt and Maurer in [HM97], drawing a natural but non-obvious connection between quorum systems and the extremes of secure multi-party computation. Moreover, for both the general case and for specific applications, the protocols presented here are simpler and more efficient.
引用
收藏
页码:375 / 390
页数:16
相关论文
共 50 条
  • [21] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [22] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [23] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [24] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [25] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [26] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [27] Secure Byzantine resilient federated learning based on multi-party computation
    Gao, Hongfeng
    Huang, Hao
    Tian, Youliang
    Tongxin Xuebao/Journal on Communications, 2025, 46 (02): : 108 - 122
  • [28] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [29] Secure Multi-Party Computation Based on Cut-and-Choose Technology
    Zhao C.
    Xu J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
  • [30] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209