A New Efficient Secure Multi-Party Computation

Article Preview

Abstract:

In an existed multi-party computation protocol, any verifier must be a participant. A new secure multi-party computation among t participants and a verifier was proposed, in which the verifier no belong to participants can learn the final output. Our protocol is more practicable in some important situations, for example, in an electronic bidding, where an arbiter is only a verifier but is usually not a participant.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

626-630

Citation:

Online since:

October 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Even, O. Goldreich and A. Lempel. A randomized Protocol for Signing Contracts. In Communications of the ACM, 28(1985) 637-647.

DOI: 10.1145/3812.3818

Google Scholar

[2] O. Goldreich. Foundations of Cryptography: Basic Applications. Cambridge University Press, (2004).

Google Scholar

[3] O. Goldreich, S. Goldwasser and S. Micali. How to Construct Random Functions. Journal of the ACM, 33(1986) 792-807.

DOI: 10.1145/6490.6503

Google Scholar

[4] O. Goldreich, H. Krawcyzk, and M. Luby. On the Existence of Pseudorandom Generators. SIAM Journal on Computing, 22(1993) 1163-1175.

DOI: 10.1137/0222069

Google Scholar

[5] J. Hastad, R. Impagliazzo, L.A. Levin, and M. Luby. Construction of a Psedorandom Generator from Any One-Way Function. SIAM Journal on Computing, 28(1999) 1364-1396.

DOI: 10.1137/s0097539793244708

Google Scholar

[6] J. Kilian and E. Petrank. An Efficient Noninteractive Zero-Knowledge Prroof System for NP with General Assumptions. Journal of Cryptology, 11(1998) 1-27.

DOI: 10.1007/s001459900032

Google Scholar

[7] Y. Lindell and B. Pinkas. A Proof of Yao's Protocol for Secure Two-Party Computation. Journal of Cryptology, 22(2009)161-188.

DOI: 10.1007/s00145-008-9036-8

Google Scholar