Paper Title:
Secure Distributed Computation in the Exponent
  Abstract

A secure multi-party computation problem deals with computing a function on any input, in a distributed network, ensuring that no more information is revealed to a player in the computation. New protocols are developed for the following interesting variation on a typical problem of secure multi-party computation: Given secrets shared among a group of players, compute the function value of basic computations, such as interpolation, addition, multiplication or inversion, in the exponent. The protocols can be proven robust and secure in standard computation models.

  Info
Periodical
Advanced Materials Research (Volumes 217-218)
Edited by
Zhou Mark
Pages
994-1000
DOI
10.4028/www.scientific.net/AMR.217-218.994
Citation
H. Wang, S. M. Wei, "Secure Distributed Computation in the Exponent", Advanced Materials Research, Vols. 217-218, pp. 994-1000, 2011
Online since
March 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Dong Qing Xie, Chun Ming Tang
Abstract:A secure electronic protocol, which can be used for electronic voting and electronic bidding, is proposed. The protocol is based on a new...
305
Authors: Cui Hua Xie, Yu Lin Zhang
Abstract:Most of the CRE solutions either assume existence of a central planner who has all the information about the system, or assume that each...
1545
Authors: Yong Long Tang
Chapter 6: Materials and Mechanics Information System
Abstract:In an existed multi-party computation protocol, any verifier must be a participant. A new secure multi-party computation among t participants...
626
Authors: Meng Chang Liu, Ning Zhang
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:Statistical hypothesis test is an important data analysis theory that has found applications in various research fields. It provides a...
1249
Authors: Wei Liang, Jian Bo Xu, Wei Hong Huang, Li Peng
Chapter 4: Material Engineering, Energy Science and Ecological Resources
Abstract:Network security technology ensures secure data transmission in network. Meanwhile, it brings extra overhead of security system in terms of...
544