2021
DOI: 10.3390/cryptography5030019
|View full text |Cite
|
Sign up to set email alerts
|

Fair and Secure Multi-Party Computation with Cheater Detection

Abstract: Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A variety of results related to increasing the efficiency of SMC protocol have been reported, and thus, SMC can be used in various applications. With the SMC protocol in smart grids, it becomes possible to obtain information for load balancing and various statistics, without revealing sensitive user information. To prevent malicious users from tampering with in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 65 publications
0
2
0
Order By: Relevance
“…The decryption is not necessary if all parties behave honestly for opening the shares. Our scheme provides better privacy than [17] as the secret aggregation or decryption is performed by the computing parties, not the TTP. The inability of adversaries to know the output until successful delivery enables the player-elimination technique proposed in [11] to achieve fairness and robustness.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The decryption is not necessary if all parties behave honestly for opening the shares. Our scheme provides better privacy than [17] as the secret aggregation or decryption is performed by the computing parties, not the TTP. The inability of adversaries to know the output until successful delivery enables the player-elimination technique proposed in [11] to achieve fairness and robustness.…”
Section: Introductionmentioning
confidence: 99%
“…A robust MPC with identifiable abort is proposed in [16], where robustness is obtained by t-secure secret-sharing and needs ZKP for every share opening in the online phase. A cryptographic solution, described in [17], is suggested to achieve fairness, but it incurs high complexity and relies on an external party for decryption. Although our scheme also uses a TTP to provide encryption keys, it requires the ciphertexts of multiplicative ciphers in the offline phase, such that the online phase does not need to invoke cryptographic functionalities for the computation.…”
Section: Introductionmentioning
confidence: 99%