{"title":"安全多方计算的算术密码协议","authors":"D. Mishra, M. Chandwani","doi":"10.1109/SECON.2007.342846","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform secure communication with TTP for computation. During the computation, TTP may undesirably extract data of all the parties for misuse. It may be risky if the data is sent out.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Arithmetic cryptography protocol for secure multi-party computation\",\"authors\":\"D. Mishra, M. Chandwani\",\"doi\":\"10.1109/SECON.2007.342846\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform secure communication with TTP for computation. During the computation, TTP may undesirably extract data of all the parties for misuse. It may be risky if the data is sent out.\",\"PeriodicalId\":423683,\"journal\":{\"name\":\"Proceedings 2007 IEEE SoutheastCon\",\"volume\":\"111 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2007 IEEE SoutheastCon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2007.342846\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2007 IEEE SoutheastCon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2007.342846","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Arithmetic cryptography protocol for secure multi-party computation
In this paper, we propose a cryptographic solution for secure multi-party computation (SMC). SMC is also called secure function evaluation, which is extensively studied in classical cryptography. SMC protocol allows n participants p1...pn to compute an n-input data through trusted third party (TTP) without revealing the information of the parties. All the parties may perform secure communication with TTP for computation. During the computation, TTP may undesirably extract data of all the parties for misuse. It may be risky if the data is sent out.