2015
DOI: 10.1007/s12652-015-0299-2
|View full text |Cite
|
Sign up to set email alerts
|

A brief survey on secure multi-party computing in the presence of rational parties

Abstract: Intelligent agents (IA) are autonomous entities which observe through sensors and act upon an environment using actuators to adjust their activities towards achieving certain goals. The architectures of agents have enormous potentials when they are applied into critical systems, where agents choose actions between working with their own and cooperating with others. Rational utility-based agents choose actions to maximize their expected utilities. Rational secure multi-party computing (RSMPC) means secure multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 76 publications
0
7
0
Order By: Relevance
“…Simultaneously, due to an attribute-based encryption algorithm, topics such as the revocation or update of permission are also one of the directions that need to be studied in the future. We will continue to refine our approach in conjunction with some other research [37,[54][55][56][57].…”
Section: Discussionmentioning
confidence: 99%
“…Simultaneously, due to an attribute-based encryption algorithm, topics such as the revocation or update of permission are also one of the directions that need to be studied in the future. We will continue to refine our approach in conjunction with some other research [37,[54][55][56][57].…”
Section: Discussionmentioning
confidence: 99%
“…In [26], the deep learning task was addressed. Besides the above related work, several fundamental secure algorithms, such as dynamic homomorphic encryption [27,28], authentication [29,30], and light-weight multiparty computation [31], which have also been considered in the malicious model, have been proposed. However, to the best of our knowledge, no existing study has considered a method for outsourcing computation in the malicious model.…”
Section: Ppdm With Multiparticipant Data Storage and Computationmentioning
confidence: 99%
“…That means the inner data process is protected by the trusted platform and anyone (even the platform managers) could not damage the data on the application platform. Also we assume that all communications go through a security channel (Wang et al, 2015b;Wang et al, 2015c;Wang et al, 2015d) between tenants and service providers. By this assumption, we mainly pay attention to attack behaviours such as tamper, delete or forge tenant's data on the physical storage of each data node from external and internal.…”
Section: Attack Modelmentioning
confidence: 99%