Secure multi-party computation protocol for sequencing problem

被引:0
作者
ChunMing Tang
GuiHua Shi
ZhengAn Yao
机构
[1] Guangzhou University,School of Mathematics and Information Science
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Software Science
[3] Sun Yat-Sen University,School of Mathematics and Computational Science
来源
Science China Information Sciences | 2011年 / 54卷
关键词
secure multi-party computation; sequencing problem; secret sharing;
D O I
暂无
中图分类号
学科分类号
摘要
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t ⩽ (n − 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires’ problem.
引用
收藏
页码:1654 / 1662
页数:8
相关论文
共 9 条
  • [1] Fagin R.(1996)Comparing information without leaking it Commun ACM 39 77-85
  • [2] Naor M.(2004)A protocol of comparing information without leaking J Software 15 421-427
  • [3] Winkler P.(2009)A proof of Yao’s protocol for secure two-party computation J Cryptology 22 161-188
  • [4] Qin J.(1979)How to share a secret Commun ACM 22 612-613
  • [5] Zhang Z. F.(undefined)undefined undefined undefined undefined-undefined
  • [6] Feng D. G.(undefined)undefined undefined undefined undefined-undefined
  • [7] Lindell Y.(undefined)undefined undefined undefined undefined-undefined
  • [8] Pinkas B.(undefined)undefined undefined undefined undefined-undefined
  • [9] Shamir A.(undefined)undefined undefined undefined undefined-undefined