Trusted coalition-proof protocol model based on secure multi-part computing
N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...
Saved in:
| Main Authors: | CHENG Bai-liang1, ZENG Guo-sun1, JIE An-quan2 |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2011-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74419969/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism
by: Nothile C. Masango, et al.
Published: (2025-03-01) -
Building Coalitions: Extra Resources for Coalitions
by: Elizabeth B. Bolton, et al.
Published: (2015-01-01) -
Paired coalition in graphs
by: Mohammad Reza Samadzadeh, et al.
Published: (2025-01-01) -
On the Coalition Number of the <i>d</i>th Power of the <i>n</i>-Cycle
by: Qinglin Jia, et al.
Published: (2025-05-01) -
The closer, the better – How perceived ideological proximity between parties affects the emergence of coalition preferences
by: L. Constantin Wurthmann, et al.
Published: (2024-12-01)