Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2011, Vol. 34 ›› Issue (4): 118-121.doi: 10.13190/jbupt.201104.118.xuf

• Reports • Previous Articles     Next Articles

Extended Proxy MultiParty Computation and Its Protocol

  

  • Received:2010-08-13 Revised:2011-03-07 Online:2011-08-28 Published:2011-07-18

Abstract:

As for the shortcoming that the participants cant carry out secure multiparty protocol, an extended proxy multiparty is proposed. The model has higher security comparing to the related models, it is formally described from functionality, protocol and security. A secure union set protocol is designed under this model, furthermore, the protocols efficiency, security and correctness are discussed.

Key words: secure multiparty computation, proxy multiparty computation, secure outsourcing computation, secure sum protocol