Secure computation protocols under asymmetric scenarios in enterprise information system

Yilei Wang,Minghao Zhao,Yuemei Hu,Yijie Gao,Xinchun Cui
DOI: https://doi.org/10.1080/17517575.2019.1597387
2019-03-28
Enterprise Information Systems
Abstract:It has become acentral question to guarantee the security of sensitive data in enterprise information systems. Actually, different enterprises may grasp asymmetric information due to their scales. How to guarantee the computation security under such scenario is acrucial problem for enterprise information system. In this paper, we propose asecure computation protocol under asymmetric information scenario in the presence of rational parties. We also work towards the achievement of security properties in enterprise information systems. Our new definition of utilities is proved to be coincident (and compatible) with the former definitions under asymmetric information scenario.
computer science, information systems
What problem does this paper attempt to address?