This paper introduces the current research status of the multi-party computation protocols,briefly showsthe current four types of multi-party computation protocols and summarizes the research direction.
In this paper we introduce a dynamic secret sharing scheme. This scheme not only can be used unrestrictedtimes to share and resume different secret without regenerating the information in the users hands,satisfy the (k,n)threshold demand ,but also can realize the asymmetric user right secret sharing and dynamically add and delete the rel-evant users.
With the development of e-commerce, digital product has been the main format of multimedia product onthe Internet. At the same time, the problem of copyright protection has gained much attention. Because of the char-acter to be copied easily, the software products such as JPEG or GIF images, applications and documents are beingcopied illegally every day. This does harm to the merchants' benefit. The goal of digital fingerprinting protocol is tostudy a method based on cryptography to trace the source of illegal copy, which in certain conditions can be applied inall kinds of software product. The basic idea of digital fingerprinting, like the fingerprint of human being, is to embedan unique "fingerprint" into each copy of the product sent to the buyer. When finding the illegal copy, the merchantcan trace the source of it, who maybe is a dishonest buyer called traitor, accuse the traitor. So the merchant can pro-tect his copyright. This paper introduces the history of digital fingerprinting protocol and discusses some of the im-portant protocol schemes.