Skip to main content

Secure Multi-party Computation – An Important Theory in Electronic Technology

  • Conference paper
Advances in Mechanical and Electronic Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 177))

  • 1038 Accesses

Abstract

Secure multi-party computation (SMC) is a key point in the field of information security and also widely used in electronic technology. The application of SMC plays an important role in many special electronic technologies such as electronic voting, electronic auction, secret sharing and threshold signature. Participant of the secure multi-party computation may leak and analyze the middle computation result or the private data, how much it will cost for a participant during the assault is depending on how much private data are leaked. This paper proposed the concept of conditionality anti-assault, under this model, even the participant is vicious, and the protocol itself is still secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Yao, A.: Protocol for Secure Computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)

    Google Scholar 

  2. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceeding STOC 1987 Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, pp. 218–229 (1987)

    Google Scholar 

  3. Goldreich, O.: Secure Multi-party Computation, working draft (2000), http://www.wisdom.weizmann.ac.il/~oded/pp.html

  4. Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    Google Scholar 

  5. Du, W., Atallah, M.J.: Privacy-Preserving Cooperative Statistical Analysis. In: 2001 ACSAC: Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14, pp. 102–110 (2001)

    Google Scholar 

  6. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, pp. 639–644 (2002)

    Google Scholar 

  7. Du, W.: A study of several specific secure two-party computation problems [Ph.D. dissertation]. Purdue University, USA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaomei Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Wang, A., Bian, S. (2012). Secure Multi-party Computation – An Important Theory in Electronic Technology. In: Jin, D., Lin, S. (eds) Advances in Mechanical and Electronic Engineering. Lecture Notes in Electrical Engineering, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31516-9_97

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31516-9_97

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31515-2

  • Online ISBN: 978-3-642-31516-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics