Abstract:
The concept of secure computation service is introduced; three specific secure computation service problems and discussed are their solutions are proposed based on random transformation. A well-accepted simulation paradigm is extended to secure computation service, and the extended simulation paradigm shows that the proposed protocols are private. Using these protocols, the service receiver can solve very complicated computation problems with very limited computing power without disclosing the privacy of the computation problems.