Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Secure Multiparty Computation between Distrusted Networks Terminals | Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 2007 Article ID 51368 10 pages doi 2007 51368 Research Article Secure Multiparty Computation between Distrusted Networks Terminals . S. Cheung1 and Thinh Nguyen2 1 Center for Visualization and Virtual Environments Department of Electrical and Computer Engineering University of Kentucky Lexington KY 40507 USA 2 School of Electrical Engineering and Computer Science Oregon State University 1148 Kelley Engineering Center Corvallis Oregon OR 97331-5501 USA Correspondence should be addressed to . S. Cheung sccheung@ Received 7 May 2007 Accepted 12 October 2007 Recommended by Stefan Katzenbeisser One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secure multiparty computation SMC is the study of such distributed computation protocols that allow distrusted parties to perform joint computation without disclosing private data. SMC is increasingly used in diverse fields from data mining to computer vision. This paper provides a tutorial on SMC for nonexperts in cryptography and surveys some of the latest advances in this exciting area including various schemes for reducing communication and computation complexity of SMC protocols doubly homomorphic encryption and private information retrieval. Copyright 2007 . S. Cheung and T. Nguyen. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION The proliferation of capturing and storage devices as well as the ubiquitous presence of computer networks make sharing of data easier than ever. Such pervasive exchange of data however has increasingly raised questions on how sensitive and private information can be .