Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology — CRYPTO ’87
  3. Conference paper

Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result

  • Conference paper
  • First Online: 01 January 2000
  • pp 87–119
  • Cite this conference paper
Advances in Cryptology — CRYPTO ’87 (CRYPTO 1987)
Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result
  • David Chaum2,
  • Ivan B. Damgård2 &
  • Jeroen van de Graaf2 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 293))

Included in the following conference series:

  • Conference on the Theory and Application of Cryptographic Techniques
  • 4057 Accesses

  • 151 Citations

  • 3 Altmetric

Abstract

A protocol is presented that allows a set of parties to collectively perform any agreed computation, where every party is able to choose secret inputs and verify that the resulting output is correct, and where all secret inputs are optimally protected.

The protocol has the following properties:

  • One participant is allowed to hide his secrets unconditionally, i.e. the protocol releases no Shannon information about these secrets. This means that a participant with bounded resources can perform computations securely with a participant who may have unlimited computing power. To the best of our knowledge, our protocol is the first of its kind to provide this possibility.

  • The cost of our protocol is linear in the number of gates in a circuit performing the computation, and in the number of participants. We believe it is conceptually simpler and more efficient than other protocols solving related problems ([Y1], [GoMiWi] and [GaHaYu]). It therefore leads to practical solutions of problems involving small circuits.

  • The protocol is openly verifiable, i.e. any number of people can later come in and rechallenge any participant to verify that no cheating has occurred.

  • The protocol is optimally secure against conspiracies: even if n − 1 out of the n participants collude, they will not find out more about the remaining participants’ secrets than what they could already infer from their own input and the public output.

  • Each participant has a chance of undetected cheating that is only exponentially small in the amount of time and space needed for the protocol.

  • The protocol adapts easily, and with negligible extra cost, to various additional requirements, e.g. making part of the output private to some participant, ensuring that the participants learn the output simultaneously, etc.

  • Participants can prove relations between data used in different instances of the protocol, even if those instances involve different groups of participants. For example, it can be proved that the output of one computation was used as input to another, without revealing more about this data.

  • The protocol can be usen as an essential tool in proving that all languages in IP have zero knowledge proof systems, i.e. any statement which can be proved interactively can also be proved in zero knowledge.

The rest of this paper is organised as follows: First we survey some related results. Then Section 2 gives an intuitive-introduction to the protocol. In Section 3, we present one of the main tools used in this paper: bit commitment schemes. Sections 4 and 5 contain the notation, terminology, etc. used in the paper. In Section 6, the protocol is presented, along with proofs of its security and correctness. In Section 7, we show how to adapt the protocol to various extra requirements and discuss some generalisations and optimisations. Finally, Section 8 contains some remarks on how to construct zero knowledge proof systems for any language in IP.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Verifiable Multi-party Computation with Perfectly Private Audit Trail

Chapter © 2016

Towards Multiparty Computation Withstanding Coercion of All Parties

Chapter © 2020

Mixed-Technique Multi-Party Computations Composed of Two-Party Computations

Chapter © 2022

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Computer Ethics
  • DNA computing and cryptography
  • Legal Aspects of Computing
  • Privacy
  • Theory of Computation
  • Blockchain

References

  1. Brassard and Crepeau: Zero knowledge simulation of boolean circuits. Proc. of Crypto 86.

    Google Scholar 

  2. Blum: Coinflipping by telephone: Protocols for solving impossible problem. Proc. of 24. IEEE CompCon, 1982.

    Google Scholar 

  3. Chaum, Damgård and Crepeau: Fundamental primitives for multiparty unconditionally secure protocols. To appear.

    Google Scholar 

  4. Chaum: Demonstrating that a public predicate can be satisfied while revealing no information about how. Proc. of Crypto 86.

    Google Scholar 

  5. Chaum: How to keep a secret alive. Proc. of Crypto 84.

    Google Scholar 

  6. Crepeau: Equivalence between two flavours of oblivious transfers. To appear in proceedings of Crypto 87.

    Google Scholar 

  7. Galil, Haber and Yung: Primitives for Designing Multi-Party Cryptographic Protocols from Specifications. To appear.

    Google Scholar 

  8. Goldreich and Vainish: How to solve any protocol problem: an efficiency improvement. Proc. of Crypto 87.

    Google Scholar 

  9. Goldreich, Micali and Wigderson: How to play any mental game, Proc. of STOC 1987.

    Google Scholar 

  10. Goldreich, Micali and Wigderson: How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design. Proc. of Crypto 86.

    Google Scholar 

  11. Goldwasser and Micali: Probabilistic Encryption. JCSS, vo1.28, No.2, April 1984, pp.270–299.

    MathSciNet  MATH  Google Scholar 

  12. Goldwasser, Micali and Rackoff: The knowledge complexity of interactive proof systems. Proc. 17th STOC, 1985.

    Google Scholar 

  13. Peralta and van de Graaf: A simple and efficient protocol to prove the validity of your public key. To appear in proceedings of Crypto 87.

    Google Scholar 

  14. Yao: How to generate and exchange secrets. Proc. of 27. FOCS, 1986.

    Google Scholar 

  15. Yao: Protocols for secure computations. Proc. of 23. FOCS, 1982.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Centre for Mathematics and Computer Science, Kruislaan 413, 1098 SJ, Amsterdam, the Netherlands

    David Chaum, Ivan B. Damgård & Jeroen van de Graaf

Authors
  1. David Chaum
    View author publications

    Search author on:PubMed Google Scholar

  2. Ivan B. Damgård
    View author publications

    Search author on:PubMed Google Scholar

  3. Jeroen van de Graaf
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Mathematics, The University of Georgia, Athens, Georgia, 30602, USA

    Carl Pomerance

Rights and permissions

Reprints and permissions

Copyright information

© 1988 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chaum, D., Damgård, I.B., van de Graaf, J. (1988). Multiparty Computations Ensuring Privacy of Each Party’s Input and Correctness of the Result. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_7

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-48184-2_7

  • Published: 01 December 2000

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-18796-7

  • Online ISBN: 978-3-540-48184-3

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Proof System
  • Commitment Scheme
  • Quadratic Residue
  • Boolean Circuit
  • Output Wire

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

172.69.59.24

ICE Institution of Civil Engineers (3000167333) - Institution of Civil Engineers Library (2000027800)

Springer Nature

© 2025 Springer Nature