Security

A Comparative Study of Available Protocols During Privacy Preservation in Secure Multiparty Computation

Free registration required

Executive Summary

In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the computation and then announce the result publicly. The major problem with this approach is that it is difficult to find a third party which is trusted by all the parties providing the inputs. This implies that the data of parties must be secured.

  • Format: PDF
  • Size: 109.31 KB