Download Now Free registration required
The authors address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. They consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. They classify malicious adversaries into two widely existing subclasses, namely, weakly and strongly malicious adversaries, and propose protocols that can effectively and efficiently protect privacy against malicious adversaries. They intend to remove the constraints on the behavior of entities. The system setting, an adversary may deviate from the protocol and/or manipulate its input database for the purpose of privacy intrusion.
- Format: PDF
- Size: 1057.3 KB