{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:38:40Z","timestamp":1775839120996,"version":"3.50.1"},"reference-count":20,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162039"],"award-info":[{"award-number":["62162039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762060"],"award-info":[{"award-number":["61762060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20YF3GA016"],"award-info":[{"award-number":["20YF3GA016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["62162039"],"award-info":[{"award-number":["62162039"]}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["61762060"],"award-info":[{"award-number":["61762060"]}]},{"name":"Foundation for the Key Research and Development Program of Gansu Province, China","award":["20YF3GA016"],"award-info":[{"award-number":["20YF3GA016"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use encryption schemes that are not resistant to quantum attacks, which is a security risk in today\u2019s quickly growing quantum computing, and, when obtaining results, the result querier needs to collect the private keys of multiple data owners to jointly decrypt them, or there needs to be an interaction between the data owner and the querier during the decryption process. Based on the NTRU cryptosystem, which is resistant to quantum computing attacks and has a simple and easy-to-implement structure, and combined with multi-key fully homomorphic encryption (MKFHE) and proxy re-encryption, this paper proposes a secure multi-party computing scheme based on NTRU-type multi-key fully homomorphic proxy re-encryption in the blockchain environment, using the blockchain as trusted storage and a trusted execution environment to provide data security for multi-party computing. The scheme meets the requirements of being verifiable, conspiracy-proof, individually decryptable by the querier, and resistant to quantum attacks.<\/jats:p>","DOI":"10.3390\/info13100481","type":"journal-article","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T23:39:31Z","timestamp":1665272371000},"page":"481","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption"],"prefix":"10.3390","volume":"13","author":[{"given":"Yongbo","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7630-759X","authenticated-orcid":false,"given":"Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1611-9017","authenticated-orcid":false,"given":"Tao","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"159426","DOI":"10.1109\/ACCESS.2019.2949782","article-title":"A Comprehensive Survey on Secure Outsourced Computation and Its Applications","volume":"7","author":"Yang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1080\/17445760.2018.1553041","article-title":"Fully homomorphic encryption: A general framework and implementations","volume":"35","author":"Akl","year":"2020","journal-title":"Int. J. Parallel Emergent Distribted Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1827","DOI":"10.1137\/14100124X","article-title":"Multikey fully homomorphic encryption and applications","volume":"46","author":"Tromer","year":"2017","journal-title":"SIAM J. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yasuda, S., Koseki, Y., and Hiromasa, R. (2018, January 9\u201312). Multi-key homomorphic proxy re-encryption. Proceedings of the International Conference on Information Security, Guildford, UK.","DOI":"10.1007\/978-3-319-99136-8_18"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Stehl\u00e9, D., and Steinfeld, R. (2011, January 15\u201319). Making NTRU as secure as worst-case problems over ideal lattices. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia.","DOI":"10.1007\/978-3-642-20465-4_4"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Micali, S., Goldreich, O., and Wigderson, A. (1987, January 25\u201327). How to play any mental game. Proceedings of the Nineteenth ACM Symp. on Theory of Computing, STOC, NY, USA.","DOI":"10.1145\/28395.28420"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"103552","DOI":"10.1016\/j.csi.2021.103552","article-title":"Generic server-aided secure multi-party computation in cloud computing","volume":"79","author":"Wu","year":"2022","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"110439","DOI":"10.1109\/ACCESS.2019.2934147","article-title":"BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wei, L., and Wu, J. (2020, January 12\u201314). Block-smpc: A blockchain-based secure multi-party computation for privacy-protected data sharing. Proceedings of the 2020 2nd International Conference on Blockchain Technology 2020, Hilo, HI, USA.","DOI":"10.1145\/3390566.3391664"},{"key":"ref_11","unstructured":"Liu, F., Yang, J., Kong, D., and Qi, J. (2020, January 28\u201331). A Secure Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature for Blockchain. Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China."},{"key":"ref_12","first-page":"281","article-title":"A secure multi-party computation protocol for universal data privacy protection based on blockchain","volume":"58","author":"Liu","year":"2021","journal-title":"J. Computer. Res. Dev."},{"key":"ref_13","first-page":"186","article-title":"Optimization of NTRU multi-key homomorphic encryption scheme","volume":"52","author":"Che","year":"2020","journal-title":"Eng. Sci. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"564","DOI":"10.26599\/TST.2019.9010076","article-title":"Modified multi-key fully homomorphic encryption based on NTRU cryptosystem without key-switching","volume":"25","author":"Che","year":"2020","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/COMST.2022.3143147","article-title":"IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks","volume":"24","author":"Daniel","year":"2022","journal-title":"IEEE Commun. Surveys. Tutor."},{"key":"ref_16","first-page":"1729","article-title":"Research on Bloom filter: A survey","volume":"42","author":"Hua","year":"2022","journal-title":"J. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"5579","DOI":"10.1007\/s11276-019-02195-0","article-title":"Recent advances in consensus protocols for blockchain: A survey","volume":"26","author":"Wan","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2022.01.029","article-title":"SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles","volume":"164","author":"Xu","year":"2022","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_19","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","volume":"Volume 6110","author":"Lyubashevsky","year":"2010","journal-title":"Theory and Application of Cryptographic Techniques"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., and Vaikuntanathan, V. (2012, January 20\u201322). On-the-fly multiparty computation on the cloud via multikey fullyhomomorphic encryption. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, New York, NY, USA.","DOI":"10.1145\/2213977.2214086"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/10\/481\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:47:26Z","timestamp":1760143646000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/10\/481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":20,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["info13100481"],"URL":"https:\/\/doi.org\/10.3390\/info13100481","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,6]]}}}