TENCON 2008 - 2008 IEEE Region 10 Conference 2008
DOI: 10.1109/tencon.2008.4766515
|View full text |Cite
|
Sign up to set email alerts
|

A zero-hacking protocol for secure multiparty computation using multiple TTP

Abstract: We present a solution to the Secure Multi-party Computation (SMC) problem in the form of a protocol that ensures zero-hacking. The solution comprises of a protocol with several trusted third parties (TTPs) where there is a possibility of threat to the security. Our protocol unanimously selects one TTP among all TTPs in the SMC architecture that owns the responsibility of all the computation in the system. This TTP is called the master TTP and it is different at different times. The procedure of selecting maste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…So, it is difficult to disclose data through TTP. Also, the minimum number of TTP must be three (Mishra, 2008). After this, to minimize risk we use encryption before sending the data to the anonymizer (Mishra, 2007a).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…So, it is difficult to disclose data through TTP. Also, the minimum number of TTP must be three (Mishra, 2008). After this, to minimize risk we use encryption before sending the data to the anonymizer (Mishra, 2007a).…”
Section: Related Workmentioning
confidence: 99%
“…The probability of reaching all the packets of any party i to any one anonymizer is Equation (1) (Mishra et al, 2008). X i is the total data of a party i.…”
Section: Performance Analysis Of Min_terrorist_adversarymentioning
confidence: 99%
“…This approach is having merit over the other one where only one TTP is given the responsibility to hold entire data of the system. Gaps in [20] are multiple TTPs are given the input but computation is performed by master TTP only. So even if this protocol defines multi TTP environment, but efficiency of TTP in the protocol is not utilized properly.…”
Section: Introductionmentioning
confidence: 99%
“…So even if this protocol defines multi TTP environment, but efficiency of TTP in the protocol is not utilized properly. The second gap in [20] is introducing packet layer. The responsibility of packet layer could be handled by parties itself and a virtual party can be used to make identity of party ambiguous.…”
Section: Introductionmentioning
confidence: 99%
“…[18] Presented a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy. [19] Presented a solution to the Secure Multi-party Computation (SMC) problem in the form of a protocol that ensures zero-hacking. The solution comprises of a protocol with several trusted third parties (TTPs) where there is a possibility of threat to the security.…”
Section: Introductionmentioning
confidence: 99%