Comparative Analysis of Secure Multi-Party Computation Based on Participants'Roles Transformation
With the rapid development and popularization of information technology,as an important technology to protect data privacy and ensure the security of computing process,secure multi-party com-putation(MPC)has received intensive attentions and in-depth researches.In the field of secure MPC,the method based on participants'roles transformation exhibits flexibility and practicality,satisfying the need in various secure computing scenarios.In this paper,secure MPC method based on participants'roles transformation is classified into three types of transferable,fluid,and proactive.A comprehensive analysis of performance characteristic for each type is performed in the terms of efficiency,security,and application prospect.With the comparative analysis of the three secure MPC types,this paper may provide theoretical and technical supports for research and practice in this field.