Security

The Study on General Secure Multi-Party Computation

Download Now Free registration required

Executive Summary

This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit analysis agreement and the applications of these agreements on security multiparty computation are investigated in the study. Moreover, the study also explores network application technology, such as electronic auction, electronic voting, encrypted data computation and threshold cryptology.

  • Format: PDF
  • Size: 130.91 KB