Malicious Computation Prevention Protocol for Secure Multi-Party Computation

被引:0
|
作者
Mishra, Durgesh Kumar [1 ]
Koria, Neha [2 ]
Kapoor, Nikhil [2 ]
Bahety, Ravish [2 ]
机构
[1] Acropolis Inst Technol & Res, Indore, Madhya Pradesh, India
[2] Acropolis Inst Technol & Res, Dept Comp Sci, Indore, Madhya Pradesh, India
关键词
Complexity; Encryption; Decryption; Encrytpo_Random; Extended Encrytpo_Random; Pool of function; Random Dissemination; Random Function; Secure Multi-Party Computation (SMC); Trusted Third Party (TTP);
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is the second version of a previously proposed protocol Extended_Encrypto_Random, which itself was an extension of the initial work Encrytpo_Random. The former endeavors presented a plain sailing yet effective approach to SMC and also laid forward an aptly crafted architecture, whereby such efficient protocols, involving the parties that have come forward for joint-computations and the third party who undertakes such computations, can be developed. Through this succeeding work an attempt has been made to further strengthen the existing protocols, thus paving the way for a more secure multi-party computational process.
引用
收藏
页码:490 / +
页数:2
相关论文
共 50 条
  • [1] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [2] A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
    Liu, Xin
    Kong, Jianwei
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    [J]. MATHEMATICS, 2023, 11 (23)
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [5] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [6] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [7] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [8] Secure multi-party computation protocol for sequencing problem
    TANG ChunMing 1
    2State Key Laboratory of Information Security
    3 School of Mathematics and Computational Science
    [J]. Science China(Information Sciences), 2011, 54 (08) : 1654 - 1662
  • [9] Secure Multi-Party Computation Protocol Using Asymmetric Encryption
    Shukla, Samiksha
    Sadashivappa, G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 780 - 785
  • [10] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210