Secure multiparty computation in cloud computing

被引:0
|
作者
Jiang H. [1 ]
Xu Q. [1 ]
机构
[1] School of Computer Science and Technology, Shandong University, Jinan
基金
中国国家自然科学基金;
关键词
Cloud computing; Cloud-assisted secure multiparty computation; Secure multiparty computation; Secure outsourced computation;
D O I
10.7544/issn1000-1239.2016.20160685
中图分类号
学科分类号
摘要
The emergence and rapid development of cloud computing structurally change the computation models of secure multi-party computation. In cloud environment, the computation task, the participants and the external environment of secure multi-party computation are becoming diversified and complicated. Using huge cloud resources to design and implement the secure multi-party computation protocol becomes a new research area. Cloud computing provides the resources to implement secure multi-party computation protocols, meanwhile, it also brings new challenge. In this paper, a survey for generalmulti-party computation in cloud setting, as well as some specific cloud-based secure multi-party computation protocols are given. Also, our opinions of the problem in the current researches and the directions for future works on multi-party computation in cloud setting are proposed. © 2016, Science Press. All right reserved.
引用
收藏
页码:2152 / 2162
页数:10
相关论文
共 37 条
  • [1] Yao A.C.C., How to generate and exchange secrets, Proc of the 27th Annual Symp on Foundations of Computer Science, pp. 162-167, (1986)
  • [2] Feige U., Kilian J., Naor M., A minimal model for secure computation (extendedabstract), Proc of the 26th ACM Symp on Theory of Computing, pp. 554-563, (1994)
  • [3] Cramer R., Damgard I., Maurer U., General secure multi-party computation from any linear secret-sharing scheme, Proc of the 19th Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 316-334, (2000)
  • [4] Cramer R., Damgard I., Nielsen J.B., Multiparty computation from threshold homomorphic encryption, Proc of the 20th Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 280-300, (2001)
  • [5] Kamara S., Mohassel P., Raykova M., Outsourcing multi-party computation, IACR Cryptology ePrint Archive
  • [6] Damgard I., Faust S., Hazay C., Secure two-party computation with low communication, Proc of the 9th Theory of Cryptography Conf, pp. 54-74, (2012)
  • [7] Kamara S., Mohassel P., Riva B., Salus: A system for server-aided secure function evaluation, Proc of the 2012 ACM Conf on Computer and communications security, pp. 797-808, (2012)
  • [8] Carter H., Mood B., Traynor P., Et al., Secure outsourced garbled circuit evaluation for mobile devices, Journal of Computer Security, 24, 2, pp. 137-180, (2016)
  • [9] Carter H., Lever C., Traynor P., Whitewash: Outsourcing garbled circuit generation for mobile devices, Proc of the 30th Annual Computer Security Applications Conf, pp. 266-275, (2014)
  • [10] Kerschbaum F., Oblivious outsourcing of garbled circuit generation, Proc of the 30th Annual ACM Symp on Applied Computing, pp. 2134-2140, (2015)