• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Han, Xu Qiuliang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763
Citation: Jiang Han, Xu Qiuliang. Advances in Key Techniques of Practical Secure Multi-Party Computation[J]. Journal of Computer Research and Development, 2015, 52(10): 2247-2257. DOI: 10.7544/issn1000-1239.2015.20150763

Advances in Key Techniques of Practical Secure Multi-Party Computation

More Information
  • Published Date: September 30, 2015
  • In the setting of secure multi-party computation, two or more parties with private inputs wish to compute some joint function of their inputs and achieve the security requirements of privacy, correctness, independence of inputs and more. Secure multi-party computation is not only the general basic research of secure protocol, but also applied in many applications such as coin-tossing, electronic voting and private information retrieval schemes. The research of secure multi-party computation provides a central tool in many area of cryptography. In recent years,secure multi-party computation has been advancing in leaps and bounds, especially in the practical techniques; the practical technology becomes a new attractive field in secure multi-party computation. In this paper, we introduce the main advances and results of practical secure multi-party computation, and focus on three major supporting techniques, which include garbled circuits optimization, cut-and-choose technique and oblivious transfer extension.These techniques significantly improve the efficiency of secure multi-party computation in different aspects.
  • Related Articles

    [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
    [2]Zhang Yuhong, Zhi Wenwu, Li Peipei, Hu Xuegang. Semi-Supervised Method for Cross-Lingual Word Embedding Based on an Adversarial Model with Double Discriminators[J]. Journal of Computer Research and Development, 2023, 60(9): 2127-2136. DOI: 10.7544/issn1000-1239.202220036
    [3]Yan Yunxue, Ma Ming, Jiang Han. An Efficient Privacy Preserving 4PC Machine Learning Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2022, 59(10): 2338-2347. DOI: 10.7544/issn1000-1239.20220514
    [4]Zhang Lei, He Chongde, Wei Lifei. Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets[J]. Journal of Computer Research and Development, 2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
    [5]Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    [6]Yang Wang, Gao Mingzhe, Jiang Ting. A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1021-1034. DOI: 10.7544/issn1000-1239.2021.20200912
    [7]Zhuo Junbao, Su Chi, Wang Shuhui, Huang Qingming. Min-Entropy Transfer Adversarial Hashing[J]. Journal of Computer Research and Development, 2020, 57(4): 888-896. DOI: 10.7544/issn1000-1239.2020.20190476
    [8]Peng Chengwei, Yun Xiaochun, Zhang Yongzheng, Li Shuhao. Detecting Malicious Domains Using Co-Occurrence Relation Between DNS Query[J]. Journal of Computer Research and Development, 2019, 56(6): 1263-1274. DOI: 10.7544/issn1000-1239.2019.20180481
    [9]Li Peng, Wang Ruchuan, Wu Ning. Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features[J]. Journal of Computer Research and Development, 2012, 49(5): 949-957.
    [10]Dai Hua, Qin Xiaolin, and Bai Chuanjie. A Malicious Transaction Detection Method Based on Transaction Template[J]. Journal of Computer Research and Development, 2010, 47(5): 921-929.

Catalog

    Article views (3142) PDF downloads (2589) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return