Trusted coalition-proof protocol model based on secure multi-part computing
N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...
Saved in:
Main Authors: | CHENG Bai-liang1, ZENG Guo-sun1, JIE An-quan2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419969/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01) -
Proofs without words
by: Edmundas Mazėtis, et al.
Published: (2023-11-01) -
On understanding of proof in English and American law
by: O. V. Tiaglo
Published: (2018-11-01) -
Conception of understanding in mathematical proof
by: V. V. Tselishchev, et al.
Published: (2021-12-01) -
Trust-driven job scheduling heuristics for computing grid
by: ZHANG Wei-zhe1, et al.
Published: (2006-01-01)