Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol
نویسندگان
چکیده
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.
منابع مشابه
Third Party Privacy Preserving Protocol for Secure Web Services
Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...
متن کاملCompiling an Honest but Curious Protocol
In previous lectures, the notion of secure multiparty computing was developed. The setting is that there are m parties, each of which has a private input x1, . . . , xm. The goal is to compute f(x1, . . . , xm, R) securely, where R is random coins and “securely” means that no party obtains any more knowledge about other parties’ private inputs than could be obtained if all computation were done...
متن کاملSecure Multiparty Computation from SGX
Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a malicious operating system; it also permits a remote user to obtain strong interactive attestation guarantees on both the code running in an IEE and its input/output behaviour. In this paper we sh...
متن کاملAnalysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation
A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give t he re sult t o t he respec tive parties af ter com putation in such a way t hat n o part y can ident ify o ther’s part y data. During computation of inputs, we had considered the factor, what if trusted third parties a...
متن کاملThird Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases
Privacy is become major issue in distributed data mining. In the literature we can found many proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of trusted third party models the conventional asymmetric cryptographic based techniques will be used and in case of multi party based protocols dat...
متن کامل