Abstract
In the field of multi-party computation, an important problem is how to construct an efficient and secure multi-party computation protocol for certain specific problems. In the present study, we make use of a secret sharing scheme to construct an efficient and secure multi-party computation protocol for sequencing problems. Our protocols are perfectly secure against both a passive adversary that can corrupt at most t ⩽ (n − 1)/2 participants, and an active adversary that can corrupt at most t < n/3 participants. The simplest sequencing problem is the Millionaires’ problem.
Similar content being viewed by others
References
Yao A C. Protocols for secure computations. In: Proceedings of the 23 rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, 1982. 160–164
Fagin R, Naor M, Winkler P. Comparing information without leaking it. Commun ACM, 1996, 39: 77–85
Schoenmakers B, Tuyls P. Practical two-party computation based on the conditional gate. In: Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, 2004. 129–145
Qin J, Zhang Z F, Feng D G. A protocol of comparing information without leaking. J Software, 2004, 15: 421–427
Blake I F, Kolesnikov V. Strong conditional oblivious transfer and computing on intervals. In: Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, 2004. 122–135
Ioannidis I, Grama A. An efficient protocol for Yao’s Millionaires’ problem. In: Proceedings of the 36 th Hawaii International Conference on System Sciences, Hawaii, 2003. Track 7
Fischlin M. A cost-effective pay-per-multiplication comparison method for Millionaires. In: Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA Conference 2001, San Francisco, 2001. 457–471
Lin H Y, Tzeng W G. An efficient solution to the millionaires problem based on homomorphic encryption. ASIACRYPT 2005, http://eprint.iacr.org/2005/043
Cachin C. Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6 th ACM Conference on Computer and Communications Security, New York: ACM, 1999. 120–127
Luo Y L. Some key issues in secure multi-party computation and their applied research (Chinese). Dissertation of Doctoral Degree. University of Science and Technology of China, 2005
Lindell Y, Pinkas B. A proof of Yao’s protocol for secure two-party computation. J Cryptology, 2009, 22: 161–188
Goldreich O, S. Micali S, Wigderson A. How to Play any Mental Game. In: Proceedings of the nineteenth annual ACM symposium on Theory of computing STOC’ 87, New York: ACM, 1987. 218–229
Ben-Or M, Goldwasser S, Wigderson A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the twentieth annual ACM symposium on Theory of computing STOC88, 1988. 1–10
Chaum D, Crépeau C, Damgard I. Multiparty unconditionally secure protocols. In: Proceedings of the twentieth annual ACM symposium on Theory of computing STOC 88, New York: ACM, 1988. 11–19
Cramer R, Damgard I, Maurer U. General secure multi-party computation from linear secret sharing scheme. In: Advances in Cryptology—EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques, Bruges, 2000. 316–334
Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tang, C., Shi, G. & Yao, Z. Secure multi-party computation protocol for sequencing problem. Sci. China Inf. Sci. 54, 1654–1662 (2011). https://doi.org/10.1007/s11432-011-4272-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-011-4272-1