Secure computation protocol of Chebyshev distance under the malicious model
Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed...
Saved in:
Main Authors: | Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2024-07-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-024-67907-9 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
by: Zizhen Zhang, et al.
Published: (2014-01-01) -
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
by: Jiaqi Liang, et al.
Published: (2021-01-01) -
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
by: Jing Wang, et al.
Published: (2024-01-01) -
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
by: Yan Zhao, et al.
Published: (2019-04-01) -
Differential Games of Rechargeable Wireless Sensor Networks against Malicious Programs Based on SILRD Propagation Model
by: Guiyun Liu, et al.
Published: (2020-01-01)