A practical approach to solve secure multi-party computation problems

Wenliang Du, Zhijun Zhan

Research output: Contribution to conferencePaperpeer-review

122 Scopus citations


Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a computation. Each party needs to contribute its private input to this computation, but no party should disclose its private inputs to the other parties, or to any third party. With the proliferation of the Internet, SMC problems becomes more and more important. So far no practical solution has emerged, largely because SMC studies have been focusing on zero information disclosure, an ideal security model that is expensive to achieve. Aiming at developing practical solutions to SMC problems, we propose a new paradigm, in which we use an acceptable security model that allows partial information disclosure. Our conjecture is that by lowering the restriction on the security, we can achieve a much better performance. The paradigm is motivated by the observation that in practice people do accept a less secure but much more efficient solution because sometimes disclosing information about their private data to certain degree is a risk that many people would rather take if the performance gain is so significant. Moreover, in our paradigm, the security is adjustable, such that users can adjust the level of security based on their definition of the acceptable security. We have developed a number of techniques under this new paradigm, and are currently conducting extensive studies based on this new paradigm.

Original languageEnglish (US)
Number of pages9
StatePublished - 2002
EventProceedings New Security Paradigms Workshop 2002 - Virginia Beach, VA, United States
Duration: Sep 23 2002Sep 26 2002


OtherProceedings New Security Paradigms Workshop 2002
Country/TerritoryUnited States
CityVirginia Beach, VA


  • Privacy
  • Secure multi-party computation
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications


Dive into the research topics of 'A practical approach to solve secure multi-party computation problems'. Together they form a unique fingerprint.

Cite this