首页> 外文会议>International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing >Consideration of the XOR-operation Based Secure Multiparty Computation
【24h】

Consideration of the XOR-operation Based Secure Multiparty Computation

机译:考虑基于异或运算的安全多方计算

获取原文

摘要

Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. And Fujii et al. Independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. Moreover an author extended these schemes and reported existences of (2,2m) threshold secret sharing schemes with small order. This paper attempts to construct secure multiparty computations by using XOR-based secret sharing schemes.
机译:Kurihara等人提出了具有异或运算的快速(k,n)阈值秘密共享方案。和藤井等。独立地。他们的方法非常理想,即共享大小等于要分发的数据的大小,其优点是,在分发和恢复过程中仅使用XOR运算就可以很快处理。此外,作者扩展了这些方案,并报告了以小顺序存在(2,2m)门限秘密共享方案。本文试图通过使用基于XOR的秘密共享方案来构造安全的多方计算。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号