Analysis of Data in Secure Multiparty Computation

被引:0
|
作者
Shaikh, Zulfa [1 ]
Puntambekar, D. M. [1 ]
Pathak, Pushpa [1 ]
Bhati, Dinesh [1 ]
机构
[1] Acropolis Inst Technol & Res, Indore, MP, India
关键词
Security; Probability; Trusted Third Party; System acceptability; MATLAB; 7.0;
D O I
10.1109/IADCC.2009.4809103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A protocol is secure if the parties who want to compute their inputs hands it to the misted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering different probabilities for the malicious users, we have tried to find out the correctness of the result and percentage of system acceptability. We then tried to increase the number of TTP's in order to get the accuracy of the result. The aim of our proposed work is to identify what probability of malicious users will lead to the system in an unacceptable state.
引用
收藏
页码:731 / 733
页数:3
相关论文
共 50 条
  • [1] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [2] Secure multiparty quantum computation for summation and data sorting
    Li, Xiaobing
    Xiong, Yunyan
    Zhang, Cai
    [J]. QUANTUM INFORMATION PROCESSING, 2024, 23 (09)
  • [3] Data Querying and Access Control for Secure Multiparty Computation
    von Maltitz, Marcel
    Bitzer, Dominik
    Carle, Georg
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 171 - 179
  • [4] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    [J]. International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [5] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [6] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [7] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [8] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [9] Statistical analysis methods using secure multiparty computation
    Kamm, Liina
    Bogdanov, Dan
    Pankova, Alisa
    Talviste, Riivo
    [J]. Cryptology and Information Security Series, 2015, 13 : 58 - 80
  • [10] Congestion Control during Data Privacy in Secure Multiparty Computation
    Shaikh, Zulfa
    Bhati, Dinesh
    Puntambekar, D. M.
    Pathak, Pushpa
    Mishra, D. K.
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2009), 2009, : 317 - +