Malicious Computation Prevention Protocol for Secure Multi-Party Computation

被引:0
|
作者
Mishra, Durgesh Kumar [1 ]
Koria, Neha [2 ]
Kapoor, Nikhil [2 ]
Bahety, Ravish [2 ]
机构
[1] Acropolis Inst Technol & Res, Indore, Madhya Pradesh, India
[2] Acropolis Inst Technol & Res, Dept Comp Sci, Indore, Madhya Pradesh, India
关键词
Complexity; Encryption; Decryption; Encrytpo_Random; Extended Encrytpo_Random; Pool of function; Random Dissemination; Random Function; Secure Multi-Party Computation (SMC); Trusted Third Party (TTP);
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is the second version of a previously proposed protocol Extended_Encrypto_Random, which itself was an extension of the initial work Encrytpo_Random. The former endeavors presented a plain sailing yet effective approach to SMC and also laid forward an aptly crafted architecture, whereby such efficient protocols, involving the parties that have come forward for joint-computations and the third party who undertakes such computations, can be developed. Through this succeeding work an attempt has been made to further strengthen the existing protocols, thus paving the way for a more secure multi-party computational process.
引用
收藏
页码:490 / +
页数:2
相关论文
共 50 条
  • [41] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [42] Minimal complete primitives for secure multi-party computation
    Fitzi, M
    Garay, JA
    Maurer, U
    Ostrovsky, R
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (01) : 37 - 61
  • [43] Secure Multi-party Quantum Computation with a Dishonest Majority
    Dulek, Yfke
    Grilo, Alex B.
    Jeffery, Stacey
    Majenz, Christian
    Schaffner, Christian
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 729 - 758
  • [44] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899
  • [45] Secure Multi-Party Computation with Service Contract Automata
    Basile, Davide
    [J]. ERCIM NEWS, 2021, (126): : 32 - 33
  • [46] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390
  • [47] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270
  • [48] Secure Key Management for Multi-Party Computation in MOZAIK
    Marque, Enzo
    Moeyersons, Jerico
    Pohle, Erik
    Van Kenhove, Michiel
    Abidin, Aysajan
    Volckaert, Bruno
    [J]. 2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 133 - 140
  • [49] Recent Advances in Practical Secure Multi-Party Computation
    Ohata, Satsuya
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1134 - 1141
  • [50] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161