• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (3): 58-65.

• 论文 • Previous Articles     Next Articles

An efficient  twoparty secure computation
protocol under the malicious model  

YANG Yong   

  1. (The 54th Institution,China Electronics Technology Group Corporation,Shijiazhuang 050081,China)
  • Received:2012-03-01 Revised:2012-06-08 Online:2013-03-25 Published:2013-03-25

Abstract:

For the sake of improving the efficiency of the secure twoparty computation protocol under the malicious model, this protocol uses the simple permutation projection. Therefore, it can not only check the input consistency of the malicious party , but also avoid the complexity of full connectivity when checking the input consistency. Compared with the classic protocol, it improves the efficiency by nearly 50%. Besides, in order to better guarantee the protocol security, under the ideal/real model, based on simulation of  OT12  protocol and the knowledge proof, the paper uses the rollback method to give a rigid formal proof and failure proof of the protocol.

Key words: algorithm;security computation;malicious model;protocol;formal proof;security;computing circuit