2016 Intl IEEE Conferences on Ubiquitous Intelligence &Amp; Computing, Advanced and Trusted Computing, Scalable Computing and C 2016
DOI: 10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0077
|View full text |Cite
|
Sign up to set email alerts
|

Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications

Abstract: The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi-party settings. Secure Multi-Party Computation (MPC) allows for multiple parties to jointly compute a function on their private inputs. Unfortunately, traditional MPC algorithms are inefficient in the presence of a large number of participants. Moreover, in the traditional setting, MPC is only concerned with p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…The authors utilized trusted computing to mitigate the cyber security and privacy threats in the next generation energy networks. Considering SG as case study, similar work is also presented in [215] [217]. However, such techniques (TRE) could suffer from single point of attack as pointed out in [181].…”
Section: F Advanced Trusted Systems Based Privacy-preserving Mechanismsmentioning
confidence: 94%
See 2 more Smart Citations
“…The authors utilized trusted computing to mitigate the cyber security and privacy threats in the next generation energy networks. Considering SG as case study, similar work is also presented in [215] [217]. However, such techniques (TRE) could suffer from single point of attack as pointed out in [181].…”
Section: F Advanced Trusted Systems Based Privacy-preserving Mechanismsmentioning
confidence: 94%
“…In the same vein, Ankele et al [217] pointed out that secure multi-party computation (MPC) algorithms are inefficient if there are high numbers of participants, e.g., (n) users, in several use-cases. This is due to the fact of the traditional settings, wherein MPC considered only input values as private.…”
Section: Assest Management Wireless Sm Nan Simulation 24mentioning
confidence: 99%
See 1 more Smart Citation
“…Here, the SGX enclave essentially plays the role as an auctioneer. Similar solutions based on trusted computing are presented in [29].…”
Section: Related Workmentioning
confidence: 99%
“…Many-party applications. Many-party applications can often be modelled as communication systems, in which many mutually distrusting participants [2] wish to communicate with each other without diminishing their privacy. For example, users of a location-based service (LBS) may send their locations to a service to receive location-relevant information, but this diminishes their privacy.…”
Section: Introductionmentioning
confidence: 99%