没有合适的资源?快使用搜索试试~ 我知道了~
首页安全多方计算以及密钥共享
安全多方计算以及密钥共享
需积分: 50 719 浏览量
更新于2023-05-31
评论 2
收藏 412KB PDF 举报
Protocols for Multi-Party Computations Overview Passive secure protocol Active secure protocol
资源详情
资源评论
资源推荐

Secure Multi-Party Computations
Introduction
The problem
Secure multi-party computations
•
Consider n parties, with private inputs x
1
,. .. ,x
n
•
They want to compute a function f (x
1
,. .. ,x
n
) in a secure way
•
Security means here
•
Privacy: The respective inputs remain private
•
Correctness: The output is guaranteed to be correct
•
Fairness: Each party learns the result
•
This should even hold when some parties try to cheat
•
The following presentation is primarily based on Ref. [1, 2]
4 / 52

Secure Multi-Party Computations
Introduction
The problem
Questions at hand
•
How to carry out computations without revealing the inputs?
•
How to deal with cheating (corrupted) parties?
•
How to define security formally?
•
What is the upper limit of corrupted parties allowed?
•
How does this bound depend on the assumption made about the
attacker?
5 / 52
剩余51页未读,继续阅读



















安全验证
文档复制为VIP权益,开通VIP直接复制

评论0