J4 ›› 2013, Vol. 35 ›› Issue (3): 58-65.
• 论文 • Previous Articles Next Articles
YANG Yong
Received:
Revised:
Online:
Published:
Abstract:
For the sake of improving the efficiency of the secure twoparty computation protocol under the malicious model, this protocol uses the simple permutation projection. Therefore, it can not only check the input consistency of the malicious party , but also avoid the complexity of full connectivity when checking the input consistency. Compared with the classic protocol, it improves the efficiency by nearly 50%. Besides, in order to better guarantee the protocol security, under the ideal/real model, based on simulation of OT12 protocol and the knowledge proof, the paper uses the rollback method to give a rigid formal proof and failure proof of the protocol.
Key words: algorithm;security computation;malicious model;protocol;formal proof;security;computing circuit
YANG Yong. An efficient twoparty secure computation protocol under the malicious model [J]. J4, 2013, 35(3): 58-65.
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2013/V35/I3/58