Secure multiparty computations without computers

被引:67
作者
Niemi, V
Renvall, A [1 ]
机构
[1] Univ Turku, Turku Ctr Comp Sci, Turku 20014, Finland
[2] Univ Turku, Dept Math, Turku 20014, Finland
[3] Univ Vaasa, Dept Math & Stat, Vaasa 65101, Finland
关键词
D O I
10.1016/S0304-3975(97)00107-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical AND-gate can be performed by five simple playing cards. We show that by using a reasonable amount of cards many useful functions can be computed in such a way that each input stays private.
引用
收藏
页码:173 / 183
页数:11
相关论文
共 50 条
  • [31] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [32] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [33] Multiparty computations in non-private environments
    Liskiewicz, M.
    General Theory of Information Transfer and Combinatorics, 2006, 4123 : 1097 - 1099
  • [34] Trust Enabled Secure Multiparty Computation
    Dong, Renren
    Kresman, Ray
    2010 14TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV 2010), 2010, : 531 - 536
  • [35] Secure Multiparty Computation in arbitrary rings
    Prunescu, Mihai
    2021 23RD INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2021), 2021, : 283 - 290
  • [36] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345
  • [37] Secure Multiparty Computation with Minimal Interaction
    Ishai, Yuval
    Kushilevitz, Eyal
    Paskin-Cherniavsky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 577 - 594
  • [38] Efficient Secure Multiparty Computational Geometry
    Li Shundong
    Wang Daoshun
    Dai Yiqi
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (02): : 324 - 328
  • [39] Absentia: Secure Multiparty Computation on Ethereum
    Demirag, Didem
    Clark, Jeremy
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, 2021, 12676 : 381 - 396
  • [40] Analysis of Data in Secure Multiparty Computation
    Shaikh, Zulfa
    Puntambekar, D. M.
    Pathak, Pushpa
    Bhati, Dinesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 731 - 733