Design, Analysis, and Evaluation of Mobile Agent based Privacy Protection Scheme for Multi-party Computation Problems
نویسندگان
چکیده
منابع مشابه
A Mobile Agent based Computing Model for Enhancing Privacy in Multi-party Collaborative Problem solving
Privacy is an important issue in multi-party collaborative problems that are conventionally dealt with distributed algorithms. To get the solution, the participants need to share their private information, resulting in privacy loss. Several multiagent algorithms try to reduce privacy loss by reducing the amount of shared private information among the agents. To address the privacy issue in mult...
متن کاملMARP: Mobile Agent for RFID Privacy Protection
Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme u...
متن کاملTrading Correctness for Privacy in Unconditional Multi-Party Computation
This paper improves on the classical results in unconditionally secure multi-party computation among a set of n players, by considering a model with three simultaneously occurring types of player corruption: the adversary can actively corrupt (i.e. take full control over) up to ta players and, additionally, can passively corrupt (i.e. read the entire information of) up to tp players and fail-co...
متن کاملComplexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an inputy, and both parties wish to securely compute f(x, y). We show several new results classifyingthe feasibility of securely implementing these functions in several security settings. Namely, wegive new alternate characterizations of the functions that have (statistically) secure protocolsagainst p...
متن کاملPrivacy-Preserving Classification and Clustering Using Secure Multi-Party Computation
Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each par...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IPSJ Digital Courier
سال: 2007
ISSN: 1349-7456
DOI: 10.2197/ipsjdc.3.320