Font Size: a A A

Study On Secure Multi-Party Computation And Its Applications

Posted on:2006-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2168360152471679Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Secure multi-party computation and its applications are discussed in this thesis.Secure multi-party computation and some related knowledge have been introducedfirstly. A deep research on secure multi-party computation protocols has been madesecondly, which include a whole summarization of the existing protocol, the multi-partycircuit evaluation protocol, and a new protocol, the secure multi-party multiplicationprotocol, and a secure multi-party linear system of equations protocol, which is constructedby the secure multi-party multiplication protocol. And the group key agreement hasbeen discussed as a special case of secure multi-party computation finally.The main results of this thesis are as follows:1. A secure multi-party multiplication protocol using the techniques of signcryption and oblivious transfer has been proposed and analyzed.2. A secure multi-party linear system of equations protocol, which is construced by the secure multi-party multiplication protocol, has been proposed and analyzed. The protocol solves the multi-party linear system of equations problem.3. The group key agreement has been discussed as a special case of secure multi-party computation. An identity-based group key agreement protocol and a certification-based group key agreement protocol have been designed and their security and complexity have been analyzed.
Keywords/Search Tags:secure multi-party computation, circuit evaluation, multiplication protocol, linear system of equations protocol, group key agreement
PDF Full Text Request
Related items