{"title":"高效、安全的多方汇总,不需要半诚实的第三方","authors":"Zhuo Liu , Fulin Li , Mu Han , Shixin Zhu","doi":"10.1016/j.comnet.2025.111690","DOIUrl":null,"url":null,"abstract":"<div><div>In modern distributed computing systems, ensuring the security and privacy of data across numerous distributed devices is paramount. We propose an efficient and verifiable multiparty summation protocol using public-key cryptography. Each participant can securely share encrypted data with attached validity proofs, enabling anyone to independently verify and compute the final result. This decentralized protocol eliminates the need for a semi-honest third party, enhancing resilience against active attacks from malicious participants and observers. Additionally, it removes the requirement for secret channels, making it ideal for public networks. This design significantly reduces overhead while ensuring robust security. Experimental results demonstrate the efficiency and scalability of our protocol, highlighting its potential for practical applications in privacy-preserving computations across medical, military, and commercial domains.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111690"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficient and secure multiparty summation without semi-honest third-party\",\"authors\":\"Zhuo Liu , Fulin Li , Mu Han , Shixin Zhu\",\"doi\":\"10.1016/j.comnet.2025.111690\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In modern distributed computing systems, ensuring the security and privacy of data across numerous distributed devices is paramount. We propose an efficient and verifiable multiparty summation protocol using public-key cryptography. Each participant can securely share encrypted data with attached validity proofs, enabling anyone to independently verify and compute the final result. This decentralized protocol eliminates the need for a semi-honest third party, enhancing resilience against active attacks from malicious participants and observers. Additionally, it removes the requirement for secret channels, making it ideal for public networks. This design significantly reduces overhead while ensuring robust security. Experimental results demonstrate the efficiency and scalability of our protocol, highlighting its potential for practical applications in privacy-preserving computations across medical, military, and commercial domains.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"272 \",\"pages\":\"Article 111690\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625006577\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006577","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Efficient and secure multiparty summation without semi-honest third-party
In modern distributed computing systems, ensuring the security and privacy of data across numerous distributed devices is paramount. We propose an efficient and verifiable multiparty summation protocol using public-key cryptography. Each participant can securely share encrypted data with attached validity proofs, enabling anyone to independently verify and compute the final result. This decentralized protocol eliminates the need for a semi-honest third party, enhancing resilience against active attacks from malicious participants and observers. Additionally, it removes the requirement for secret channels, making it ideal for public networks. This design significantly reduces overhead while ensuring robust security. Experimental results demonstrate the efficiency and scalability of our protocol, highlighting its potential for practical applications in privacy-preserving computations across medical, military, and commercial domains.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.