Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

نویسندگان

  • Zulfa Shaikh
  • Poonam Garg
چکیده

We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Third Party Privacy Preserving Protocol for Secure Web Services

Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...

متن کامل

Compiling an Honest but Curious Protocol

In previous lectures, the notion of secure multiparty computing was developed. The setting is that there are m parties, each of which has a private input x1, . . . , xm. The goal is to compute f(x1, . . . , xm, R) securely, where R is random coins and “securely” means that no party obtains any more knowledge about other parties’ private inputs than could be obtained if all computation were done...

متن کامل

Secure Multiparty Computation from SGX

Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a malicious operating system; it also permits a remote user to obtain strong interactive attestation guarantees on both the code running in an IEE and its input/output behaviour. In this paper we sh...

متن کامل

Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give t he re sult t o t he respec tive parties af ter com putation in such a way t hat n o part y can ident ify o ther’s part y data. During computation of inputs, we had considered the factor, what if trusted third parties a...

متن کامل

Third Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases

Privacy is become major issue in distributed data mining. In the literature we can found many proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols dat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012