Download Now Free registration required
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, the authors had considered the factor, what if trusted third parties are malicious? Considering different probabilities for the malicious users, they have tried to find out the correctness of the result and percentage of system acceptability. They, then tried to increase the number of TTP's in order to get the accuracy of the result.
- Format: PDF
- Size: 262.96 KB