Key Technologies and Applications of Secure Multiparty Computation

Download Now
Provided by: Institute of Advanced Engineering and Science (IAES)
Topic: Security
Format: PDF
With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security provided a new computing model for the network collaborative computing. First, the authors introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second, they discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.
Download Now

Find By Topic