Design of a Secure Sum Protocol using Trusted Third Party System for Secure Multi-Party Computations

被引:0
|
作者
Jahan, Israt [1 ]
Sharmy, Nure Naushin [1 ]
Jahan, Sadia [1 ]
Ebha, Farjana Akther [1 ]
Lisa, Nusrat Jahan [1 ]
机构
[1] Ahsanaullah Univ Sci & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Secure Multi-party Computation; Secure Sum Protocol; Privacy Preserving; Trusted Third Party; Random Numbers; Segment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distributed data mining, secrecy of private data input of parties with similar background, is achieved by Secure Multi Party Computation (SMC). One of the mostly used tool of SMC is secure sum protocol which has been modified by researchers using many techniques to provide utmost security. In this paper, we propose another novel secure sum protocol to provide more data security in an efficient way named Double Random Partitioned Model (DRPM) protocol for multi-party computation that uses the collaboration of data segmentation, value randomization technique and trusted third party for ensuring zero data leakage among participating parties. Proposed method have reduced computational steps noticeably than all other existing protocols. The comparative study shows that the proposed protocol performs much better than the existing protocols in terms of communication complexity and computation complexity, e.g., proposed DRPM protocol improves 85% on computational complexity over the existing best one.
引用
收藏
页码:136 / 141
页数:6
相关论文
共 50 条
  • [1] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04)
  • [2] Secure Multi-party Comparison Protocol and Application
    Zhang, Jing
    Luo, Shoushan
    Yang, Yixian
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 292 - 304
  • [3] Secure Multi-Party Computation Protocol Using Asymmetric Encryption
    Shukla, Samiksha
    Sadashivappa, G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 780 - 785
  • [4] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [5] Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
    Backes, Michael
    Maffei, Matteo
    Mohammadi, Esfandiar
    [J]. IARCS ANNUAL CONFERENCE ON FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE (FSTTCS 2010), 2010, 8 : 352 - 363
  • [6] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [7] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [8] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [9] Secure multi-party computation protocol for sorting problem
    Li, Shundong
    Zhang, Xuanping
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2008, 42 (02): : 231 - 233
  • [10] An unconditionally secure protocol for multi-party set intersection
    Li, Ronghua
    Wu, Chuankun
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 226 - +