The Study on General Secure Multi-party Computation
نویسندگان
چکیده
This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit analysis agreement and the applications of these agreements on security multiparty computation are investigated in the study. Moreover, the study also explores network application technology, such as electronic auction, electronic voting, encrypted data computation and threshold cryptology. This paper further analyzes the combination of rational model and security multiparty computation and proposes a new rational secret sharing method with two rational participants to improve previous methods. Based on (m + n, t + 1) threshold, a new (m+ n, t1 + t2) threshold, utilizing the definition of specific permission secret sharing, is proposed and a respondent rational secret sharing protocol is constructed. This paper further studies the theories of UC model and proposes a UC security highperformance voting agreement, which is based on bilinear pairing and secret sharing, by replacing zero-knowledge proof with the new encoding method. Furthermore, this paper studies other applications of security multiparty protocol, such as threshold cryptology and electronic auctions, and constructs more secure agreements with higher performance.
منابع مشابه
Preface to Special Issue on General Secure Multi-Party Computation
More than a decade has passed since general results concerning secure two-party and multi-party computations were rst announced in 15, 24, 16] (see details in 14]). In a nutshell, assuming the existence of trapdoor permutations, these results assert that one can construct protocols for securely computing any desirable multi-party functionality. These results either require a majority of honest ...
متن کاملUnconditionally Secure Multi-Party Computation
The most general type of multi-party computation involves n participants. Participant i supplies private data xi and obtains an output function fi(x1, . . . , xn). The computation is said to be unconditionally secure if each participant can verify, with probability arbitrarily close to one, that every other participant obtains arbitrarily little information beyond their agreed output fi. We giv...
متن کاملQuorum-Based Secure Multi-party Computation
This paper describes efficient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to access structures based on quorum systems, which are collections of sets enjoying a naturallymotivated self-intersection property. Quorum-based access structures include threshold systems but are far richer and more general,...
متن کاملSecure Multi-Party Computation from any Linear Secret Sharing Scheme
We present a general treatment of non-cryptographic (i.e. information-theoretically secure) multi-party computation, based on underlying linear secret sharing scheme. This general approach gives pure linear-algebra conditions on the linear mappings describing the scheme. The approach establishing the minimal conditions for security, can lead to design of more efficient Multi-Party Computation (...
متن کاملOn Secure Two-Party Computation in Three Rounds
We revisit the exact round complexity of secure two-party computation. While four rounds are known to be sufficient for securely computing general functions that provide output to one party [Katz-Ostrovsky, CRYPTO’04], Goldreich-Krawczyk [SIAM J. Computing’96] proved that three rounds are insufficient for this task w.r.t. black-box simulation. In this work, we study the feasibility of secure co...
متن کاملEfficient Three-Party Computation from Cut-and-Choose
With relatively few exceptions, the literature on efficient (practical) secure computation has focused on secure two-party computation (2PC). It is, in general, unclear whether the techniques used to construct practical 2PC protocols—in particular, the cut-and-choose approach—can be adapted to the multi-party setting. In this work we explore the possibility of using cut-and-choose for practical...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011