Trusted coalition-proof protocol model based on secure multi-part computing

N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...

Full description

Saved in:
Bibliographic Details
Main Authors: CHENG Bai-liang1, ZENG Guo-sun1, JIE An-quan2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419969/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items