Font Size: a A A

Study On Secure Multiparty Computation Protocols

Posted on:2009-07-07Degree:MasterType:Thesis
Country:ChinaCandidate:X Z ZhangFull Text:PDF
GTID:2178360242987781Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Secure Multiparty Computation protocol is an important area in cryptography. It ' s the basis of many distributed cryptographic protocols such as threshold cryptosystem,electronic voting and electronic auction, etc. In fact, almost all protocols in distributed environment can be viewed as a special case of secure multiparty computation. It is based on many basic cryptographic protocols(e.g. homomorphic encryption and zero-knowledge proof )and some basic protocols in distributed computation(e.g. oblivious transfer and broadcast protocol).It is believed that the field of multiparty computations is today where public-key cryptography was ten years ago, namely an extremely powerful tool and rich theory whose real-life usage is at this time only beginning but will become in the future an integral part of our computing reality.Secure Multiparty Computation allows a set of players to compute an arbitrary agreed function of their private inputs in a secure way, even if an adversary may corrupt some arbitrary players. Security of multiparty computation protocol means guaranteeing the correctness of the output as well as the privacy of the players' inputs. The main research results of Secure Multiparty Computation are listed below:At first, we study the general secure multiparty computation and propose a new secure sum protocol.Next, we develop some secure multiparty statistical analysis protocols such as correlation and linear regression and their performance.Finally, we discuss the application of Secure Multiparty Computation in computational geometry and systematically study the determination of the relative position of two geometric objects under the privacy-preserving situation.
Keywords/Search Tags:Secure Multiparty Computation Protocols, Secure Sum Statistical Analysis, Computational Geometry
PDF Full Text Request
Related items