• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685
Citation: Jiang Han, Xu Qiuliang. Secure Multiparty Computation in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(10): 2152-2162. DOI: 10.7544/issn1000-1239.2016.20160685

Secure Multiparty Computation in Cloud Computing

More Information
  • Published Date: September 30, 2016
  • The emergence and rapid development of cloud computing structurally change the computation models of secure multi-party computation. In cloud environment, the computation task, the participants and the external environment of secure multi-party computation are becoming diversified and complicated. Using huge cloud resources to design and implement the secure multi-party computation protocol becomes a new research area. Cloud computing provides the resources to implement secure multi-party computation protocols, meanwhile, it also brings new challenge. In this paper, a survey for generalmulti-party computation in cloud setting, as well as some specific cloud-based secure multi-party computation protocols are given. Also, our opinions of the problem in the current researches and the directions for future works on multi-party computation in cloud setting are proposed.
  • Related Articles

    [1]Li Xi, Hu Zhigang, Hu Zhoujun, Yan Chaokun. Grid Workflow Scheduling Algorithm Based on Deadline Satisfaction[J]. Journal of Computer Research and Development, 2011, 48(5): 877-884.
    [2]Han Rui, Liu Yingbo, Wen Lijie, and Wang Jianmin. A Probabilistic Approach to Analyze and Adjust Time Constraints in Workflow Management System[J]. Journal of Computer Research and Development, 2010, 47(1): 157-163.
    [3]Yuan Yingchun, Li Xiaoping, Wang Qian, Wang Kejian. Time Optimization Heuristics for Scheduling Budget-Constrained Grid Workflows[J]. Journal of Computer Research and Development, 2009, 46(2): 194-201.
    [4]Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    [5]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.
    [6]Xiao Zhengjin, He Qinming, and Chen Qi. A Multilevel Model of Task Assignment in Fuzzy Situations of Workflow[J]. Journal of Computer Research and Development, 2007, 44(2): 302-309.
    [7]Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953.
    [8]Xu Wei, Wei Jun, Li Jing. A Service-Oriented Workflow Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(8): 1369-1375.
    [9]Jiang Hao and Dong Yisheng. A Time Performance Evaluation Method for Workflow Based on Extended Timed Petri Net[J]. Journal of Computer Research and Development, 2005, 42(5): 849-855.
    [10]Zhao Zhikun, Sheng Qiujian, Shi Zhongzhi. An Execution Semantics of UML Activity View for Workflow Modeling[J]. Journal of Computer Research and Development, 2005, 42(2): 300-307.

Catalog

    Article views (2675) PDF downloads (2224) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return