Font Size: a A A

Research Of Secure Multi-Party Computation

Posted on:2008-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:F Y YangFull Text:PDF
GTID:2178360212994642Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the continuous development of network technic, and with the appearance of high quality computer and net grid, the meanings and mode of computations are mostly changed. All of this makes it easy that the users can make use of the powerful computation resources. In such circumstance, the safety of users' data become very important and necessary. So Secure Multi-Party Computation comes forth. Secure Multi-Party Computation was firstly brought forward by A. C. Yao in 1982: There are n participantsP1,P2,(?) ,Pn, who want safely compute a function together. And the word safe means that the correctness of output message and the secrecy of input and output message. Concretely, each participant Pi has his secretinput message xi, and all the n participants compute a function together: f(x1,xx,(?),xn) = (Y1,Y2,(?),Yn).when computation has been finished, each Pi knows only his Yi, but not other information.Secure Multi-Party Computation protocol is an important area in cryptography. It's the basis of many distributed cryptographic protocols, such as threshold cryptosystem, electronic voting and electronic auction, etc. In fact, almost all protocols in distributed environment can be viewed as a special case of secure multiparty computation. It is based on many basic cryptographic protocols (e. g. homomorphic encryption and zeroknownedge proof) and some basic protocols in distributed computation (e. g. oblivious transfer and broadcast protocol). Although Secure Multiparty Computation protocol is relatively more complex than other cryptographic protocols, it has drawn many reserchers and institutes' s attention in these years. We believe that the field of multiparty computations is today where public-key cryptography was ten years ago, namely an extremely powerful tool and rich theory whose real-life usage is at this time only beginning but will become in the future an integral part of our computing reality. The thesis mainly research two aspects: The general Secure Multi-Party Computation and the specific Secure Multi-Party Computation and application.
Keywords/Search Tags:Cryptology, Secure Multi-Party Computation, Electronic voting, Forward Security Threshold signature, Computation of Encrypted Data
PDF Full Text Request
Related items