Netinfo Security ›› 2025, Vol. 25 ›› Issue (9): 1439-1446.doi: 10.3969/j.issn.1671-1122.2025.09.011

Previous Articles     Next Articles

Secure Multi-Party Computation Protocol Based on Trusted Execution Environment

SHI Yijuan1, ZHOU Danping1, FAN Lei2, LIU Yin3()   

  1. 1. Jiangnan Institute of Computing Technology, Wuxi 214128, China
    2. School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    3. State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi 214083, China
  • Received:2025-06-15 Online:2025-09-10 Published:2025-09-18

Abstract:

As data becomes increasingly valuable in information systems, privacy protection must be addressed alongside data utilization. Secure multi-party computation enables collaborative computation without direct data sharing between parties, serving as a crucial technology for privacy-preserving. Traditional multi-party computation relies on complex cryptographic protocols, incurring high communication and computational overheads that hinder practical deployment. This paper proposed an outsourced multi-party computation protocol based on the native security mechanisms of trusted execution environment. It not only ensures security properties such as privacy, correctness, and input independence, but also achieves high efficiency and scalability. The proposed protocol offers a new technical path for secure and practical multi-party computation systems, and lowers deployment barriers. It provides the practical meaning for the privacy computing.

Key words: privacy computing, trusted execution environment, secure multi-party computation

CLC Number: