Semi-trusted Collaborative Framework for Multi-party Computation

被引:1
|
作者
Wong, Kok Seng [1 ]
Kim, Myung Ho [1 ]
机构
[1] Soongsil Univ, Sch Comp, Seoul, South Korea
关键词
Data sharing; privacy preserving; secure computation protocol; collaborative computation;
D O I
10.3837/tiis.2010.06.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with their internal and external parties such as branches, clients, and service providers. When data are shared among collaborators, security and privacy concerns becoming crucial issues and cannot be avoided. Privacy is an important issue that is frequently discussed during the development of collaborative systems. It is closely related with the security issues because each of them can affect the other. The tradeoff between privacy and security is an interesting topic that we are going to address in this paper. In view of the practical problems in the existing approaches, we propose a collaborative framework which can be used to facilitate concurrent operations, single point failure problem, and overcome constraints for two-party computation. Two secure computation protocols will be discussed to demonstrate our collaborative framework.
引用
收藏
页码:411 / 427
页数:17
相关论文
共 50 条
  • [1] A multi-party non-repudiation protocol with semi-trusted third party
    Wang, CF
    Ge, JH
    Du, XJ
    Qu, J
    Zhao, TS
    Yang, SY
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 188 - 191
  • [2] Correlated Randomness Teleportation via Semi-trusted Hardware-Enabling Silent Multi-party Computation
    Lu, Yibiao
    Zhang, Bingsheng
    Zhou, Hong-Sheng
    Liu, Weiran
    Zhang, Lei
    Ren, Kui
    [J]. COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 699 - 720
  • [3] Fair multi-party exchange protocol with the off-line semi-trusted third party
    Li, Yan-Ping
    Zhang, Jian-Zhong
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (05): : 811 - 814
  • [4] A semi-trusted third party watermark protocol and implement framework
    Zhuang, YQ
    Wu, JQ
    Duan, F
    [J]. ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 1981 - 1984
  • [5] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    [J]. CEIS 2011, 2011, 15
  • [6] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    [J]. ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [7] A Fair Transaction Protocol with an Offline Semi-Trusted Third Party
    Qian, Wang
    Qi, Su
    [J]. ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2010, 4 : 249 - 257
  • [8] A Scalable Blockchain Approach for Trusted Computation and Verifiable Simulation in Multi-Party Collaborations
    Raman, Ravi Kiran
    Vaculin, Roman
    Hind, Michael
    Remy, Sekou L.
    Pissadaki, Eleftheria K.
    Bore, Nelson Kibichii
    Daneshvar, Roozbeh
    Srivastava, Biplav
    Varshney, Kush R.
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 277 - 284
  • [9] A trusted IoT data sharing method based on secure multi-party computation
    Ma, Li
    Duan, Binbin
    Zhang, Bo
    Li, Yang
    Fu, Yingxun
    Ma, Dongchao
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [10] Low Communication Secure Computation From Semi-Trusted Hardware
    Lu, Yibiao
    Zhang, Bingsheng
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3962 - 3976