翻訳と辞書
Words near each other
・ Secure file transfer program
・ Secure file transfer protocol
・ Secure Flight
・ Secure Freight Initiative
・ Secure FTP (software)
・ Secure Hash Algorithm
・ Secure Hash Standard
・ Secure Hypertext Transfer Protocol
・ Secure input and output handling
・ Secure instant messaging
・ Secure Islands
・ Secure key issuing cryptography
・ Secure messaging
・ Secure Mobile Architecture
・ Secure Mobile Payment Service
Secure multi-party computation
・ Secure multicast
・ Secure Neighbor Discovery
・ Secure Network
・ Secure operating system
・ Secure Operations Language
・ Secure Password Authentication
・ Secure Real-time Transport Protocol
・ Secure Remote Password protocol
・ Secure Rural Schools and Community Self-Determination Act of 2000
・ Secure Shell
・ Secure Socket Tunneling Protocol
・ Secure state
・ Secure Stations Scheme
・ Secure Store and Forward


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Secure multi-party computation : ウィキペディア英語版
Secure multi-party computation

Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private.
==Definition and Overview==
In an MPC, a given number of participants, p1, p2, ..., pN, each have private data, respectively d1, d2, ..., dN. Participants want to compute the value of a public function on that private data: F(d1, d2, ..., dN) while keeping their own inputs secret.
For example, suppose we have three parties Alice, Bob and Charlie, with respective inputs x,y and z denoting their salaries. They want to find out which of the three salaries is the highest, without revealing to each other how much each of them makes. Mathematically, this translates to them computing:
:
If there were some trusted outside party (say, they had a mutual friend Tony who they knew could keep a secret), they could each tell their salary to Tony, he could compute the maximum, and tell that number to all of them. The goal of MPC is to design a protocol, where, by exchanging messages only with each other, Alice, Bob, and Charlie can still learn without revealing who makes what and without having to rely on Tony. They should learn no more by engaging in their protocol than they would learn by interacting with an incorruptible, perfectly trustworthy Tony.
In particular, all that the parties can learn is what they can learn from the output and their own input. So in the above example, if the output is z, then Charlie learns that his z is the maximum value, whereas Alice and Bob learn (if x, y and z are distinct), that their input is not equal to the maximum, and that the maximum held is equal to z. The basic scenario can be easily generalised to where the parties have several inputs and outputs, and the function outputs different values to different parties.
Informally speaking, the most basic properties that a multi-party computation protocol aims to ensure are:
* Input privacy: No information about the private data held by the parties can be inferred from the messages sent during the execution of the protocol. The only information that can be inferred about the private data is whatever could be inferred from seeing the output of the function alone.
* Correctness: Any proper subset of adversarial colluding parties willing to share information or deviate from the instructions during the protocol execution should not be able to force honest parties to output an incorrect result. This correctness goal comes in two flavours: either the honest parties are guaranteed to compute the correct output (a “robust” protocol), or they abort if they find an error (an MPC protocol “with abort”).
There are a wide range of practical applications, varying from simple tasks such as coin tossing to more complex ones like electronic auctions (e.g. compute the market clearing price), electronic voting, or privacy-preserving data mining. A classical example is the Millionaire's Problem: two millionaires want to know who is richer, in such a way that neither of them learns the net worth of the other. A solution to this situation is essentially to securely evaluate the comparison function.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Secure multi-party computation」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.