Abstract
Secure multi-party computation (SMC) is a key point in the field of information security and also widely used in electronic technology. The application of SMC plays an important role in many special electronic technologies such as electronic voting, electronic auction, secret sharing and threshold signature. Participant of the secure multi-party computation may leak and analyze the middle computation result or the private data, how much it will cost for a participant during the assault is depending on how much private data are leaked. This paper proposed the concept of conditionality anti-assault, under this model, even the participant is vicious, and the protocol itself is still secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yao, A.: Protocol for Secure Computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceeding STOC 1987 Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, pp. 218–229 (1987)
Goldreich, O.: Secure Multi-party Computation, working draft (2000), http://www.wisdom.weizmann.ac.il/~oded/pp.html
Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)
Du, W., Atallah, M.J.: Privacy-Preserving Cooperative Statistical Analysis. In: 2001 ACSAC: Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14, pp. 102–110 (2001)
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, pp. 639–644 (2002)
Du, W.: A study of several specific secure two-party computation problems [Ph.D. dissertation]. Purdue University, USA (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, X., Wang, A., Bian, S. (2012). Secure Multi-party Computation – An Important Theory in Electronic Technology. In: Jin, D., Lin, S. (eds) Advances in Mechanical and Electronic Engineering. Lecture Notes in Electrical Engineering, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31516-9_97
Download citation
DOI: https://doi.org/10.1007/978-3-642-31516-9_97
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31515-2
Online ISBN: 978-3-642-31516-9
eBook Packages: EngineeringEngineering (R0)