Secure multi-party computation over networks

Citation
Y. Nishitani et Y. Igarashi, Secure multi-party computation over networks, IEICE T INF, E83D(3), 2000, pp. 561-569
Citations number
33
Categorie Soggetti
Information Tecnology & Communication Systems
Journal title
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
ISSN journal
09168532 → ACNP
Volume
E83D
Issue
3
Year of publication
2000
Pages
561 - 569
Database
ISI
SICI code
0916-8532(200003)E83D:3<561:SMCON>2.0.ZU;2-O
Abstract
Consider a set of parties who do not trust each other but want to compute: some agreed function of their inputs in a secure way. This problem is known as multi-party computation. It has various interesting applications includ ing election over the internet, electric contracts, private and secret data base, joint signatures, and others. A number of techniques for the problem have been proposed. Secure protocols for multipaty computation known so car are mainly based on threshold secret sharing, verifiable secret sharing, z ero-knowledge proofs, and error-correcting codes. We survey important and i nteresting results on secure multi-party computation under the existence of various types of adversaries.