Secure multi-party computation protocol for sequencing problem

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:yorehi
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems.In the present study,we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems.Our protocols are perfectly secure against both a passive adversary that can corrupt at most t (n-1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants.The simplest sequencing problem is the Millionaires’ problem. In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. We the use of a secret sharing scheme to construct an efficient and secure multi -party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t (n-1) / 2 participants, and an active adversary that can corrupt at most t
其他文献