Tang ChunMing; Shi GuiHua Guangzhou Univ Sch Math & Informat Sci Guangzhou 510006 Guangdong Peoples R China. Tang ChunMing Chinese Acad Sci State Key Lab Informat Secur Inst Software Sci Beijing 100080 Peoples R China. Yao ZhengAn Sun Yat Sen Univ Sch Math & Computat Sci Guangzhou 510275 Guangdong Peoples R China.
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t a (c) 1/2 (n - 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires' problem.
English Abstract:
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t a (c) 1/2 (n - 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires' problem.