2020
DOI: 10.1016/j.ins.2019.07.031
|View full text |Cite
|
Sign up to set email alerts
|

An efficient approach for secure multi-party computation without authenticated channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Access control functions (e.g., [11]) achieves privacy protection through authorization models and access control policy operations. Encryption functions applies encryption mechanisms on data values (e.g., Secure Multi-party Computation [22]).…”
Section: Privacy Protection Functionsmentioning
confidence: 99%
“…Access control functions (e.g., [11]) achieves privacy protection through authorization models and access control policy operations. Encryption functions applies encryption mechanisms on data values (e.g., Secure Multi-party Computation [22]).…”
Section: Privacy Protection Functionsmentioning
confidence: 99%
“…We accomplished substantial experiments to signify the effectiveness of our proposed methodologies by comparing them with subsisting technologies. For that purpose, we selected data set of wine quality [19]. This data set is often used in many research papers which are related to multiparty computation for protecting the privacy in distributed information mining task.…”
Section: Performance Comparabilitymentioning
confidence: 99%
“…This data set is often used in many research papers which are related to multiparty computation for protecting the privacy in distributed information mining task. Two experiments were accomplished through our proposed methodology for comparison with the outcome of experiments in [19,20]. Outcomes of experiments are shown in Table 6.…”
Section: Performance Comparabilitymentioning
confidence: 99%
“…In this way, a (computationally) secure sum can be performed without the need for pairwise secure channels. Other more recently published protocols [18,27], fulfilling the property of collusion-resistance for more than two parties, build on homomorphic encryption techniques (HE). HE allows additions or multiplications of ciphertexts on any two numbers m 1 and m 2 that have been encrypted by an encryption function Enc(x).…”
Section: Secure Sum Protocolsmentioning
confidence: 99%
“…We think that this is feasible in practice. A trend of secure sum research is to guarantee security without secure channels thanks to HE [14,27]. But as it is easy to implement secure paired connections using established TLS connections, the need of being able to communicate without secure channels in complex computations as collaborative DL might be rare.…”
Section: Introductionmentioning
confidence: 99%