期刊文献+

安全多方计算理论研究综述 被引量:5

A review of the Study of Secure Multi-party Computation
下载PDF
导出
摘要 文章针对安全多方计算理论的广泛应用价值和研究热潮,综述了安全多方计算理论的研究现状。在分析安全多方计算理论的数学模型、与密码学的关系、应用领域和基础协议的基础上,着重梳理了安全多方计算理论的研究进展,进一步探讨了研究热点和发展趋势。 Along with the research boom on the wide application value of Secure Multi-Party Computation, SMC, this article has summarized its study actuality. Moreover, it presents the research progress on SMC theory, as well as hotspots and development trend, based on revealing the relationship between mathematic model of SMC, cryptography and protocols.
作者 王婷
出处 《信息安全与技术》 2014年第5期41-44,共4页
关键词 安全多方计算 密码学 secure multi-party computation cryptography
  • 相关文献

参考文献4

二级参考文献28

  • 1Wenliang Du, Mikhail J Atallah. Secure multi-partycomputation problems and their applications: A reviewand open problems. In New Security Paradigms Work-shop 2001,September 11-13, 2001, Cloudcroft, NewMexico,USA., pp.11-20. Available at http://www.cis.syr.edu/ wedu/Research/publication.ht ml. 被引量:1
  • 2Mikhail J Atallah, Wenliang Du. Secure multi-party compu-tational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179. 被引量:1
  • 3Yao A. Protocols for secure computations. In Proc. the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA., 1982,pp.160-164. 被引量:1
  • 4Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Conference on Theory of Computing, ACM Press, New York, 1987,pp.218-229. 被引量:1
  • 5Goldwasser S. Multi-party computations: Past and present.In Proc. the 16th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, 1997, pp.21-24. 被引量:1
  • 6Lindell Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cwptology, 2003, 16(3):143-184. 被引量:1
  • 7Goldreich O. Secure multi-party computation (working draft).Available at http://www.wisdom.weizmann.ac.il/home/oded/publichtml/foc.html, 2002. 被引量:1
  • 8Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206. 被引量:1
  • 9Rakesh Agrawal, Ramakrishnan Srikant. Privacy-preserving data mining. In Proc. the PO00 ACM SIGMOD on Management of Data, ACM Press, New York. 2000. pp.439-450. 被引量:1
  • 10Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996,39(5): 77-85. 被引量:1

共引文献82

同被引文献24

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部