信息网络安全 ›› 2025, Vol. 25 ›› Issue (9): 1439-1446.doi: 10.3969/j.issn.1671-1122.2025.09.011

• 入选论文 • 上一篇    下一篇

基于可信执行环境的安全多方计算协议

拾以娟1, 周丹平1, 范磊2, 刘茵3()   

  1. 1.江南计算技术研究所,无锡 214128
    2.上海交通大学网络空间安全学院,上海 200240
    3.数据工程与先进计算国家重点实验室,无锡 214083
  • 收稿日期:2025-06-15 出版日期:2025-09-10 发布日期:2025-09-18
  • 通讯作者: 刘茵 6223152003@stu.jiangnan.edu.cn
  • 作者简介:拾以娟(1977—),女,江苏,高级工程师,博士,主要研究方向为信息安全、数据安全|周丹平(1970—),男,江西,正高级工程师,本科,CCF会员,主要研究方向为网络空间安全|范磊(1975—),男,上海,副教授,博士,主要研究方向为密码协议、网络安全|刘茵(1990—),女,山东,工程师,硕士研究生,主要研究方向为信息安全、人工智能

Secure Multi-Party Computation Protocol Based on Trusted Execution Environment

SHI Yijuan1, ZHOU Danping1, FAN Lei2, LIU Yin3()   

  1. 1. Jiangnan Institute of Computing Technology, Wuxi 214128, China
    2. School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    3. State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi 214083, China
  • Received:2025-06-15 Online:2025-09-10 Published:2025-09-18

摘要:

随着信息系统中的数据价值日益凸显,如何在充分挖掘数据价值的同时保障数据隐私安全成为关键问题。安全多方计算技术能够在双方不直接共享数据的条件下实现协同计算,是实现数据隐私保护的重要技术之一。然而,传统的安全多方计算技术依赖于复杂的密码协议,通信和计算复杂度均较高,严重制约了其在实际场景中的应用落地。文章基于可信执行环境的原生安全机制,提出一种外包型安全多方计算协议。该协议不仅满足隐私性、正确性和输入独立性等安全要求,还具有较高的运行效率和可扩展性,为构建实用的安全多方计算系统提供了一种技术路径,能够有效降低安全多方计算的实际部署成本与应用门槛,对推动隐私计算产业化具有重要实践价值。

关键词: 隐私计算, 可信执行环境, 安全多方计算

Abstract:

As data becomes increasingly valuable in information systems, privacy protection must be addressed alongside data utilization. Secure multi-party computation enables collaborative computation without direct data sharing between parties, serving as a crucial technology for privacy-preserving. Traditional multi-party computation relies on complex cryptographic protocols, incurring high communication and computational overheads that hinder practical deployment. This paper proposed an outsourced multi-party computation protocol based on the native security mechanisms of trusted execution environment. It not only ensures security properties such as privacy, correctness, and input independence, but also achieves high efficiency and scalability. The proposed protocol offers a new technical path for secure and practical multi-party computation systems, and lowers deployment barriers. It provides the practical meaning for the privacy computing.

Key words: privacy computing, trusted execution environment, secure multi-party computation

中图分类号: