An Algorithm for SMC with Analysis of Malicious Conduct

Download Now
Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
In this paper the authors implemented secure multi-party computation protocol in anonymized and randomization environment where parties have access to Trusted Third Party (TTP) who doesn't contribute any input for computation, doesn't get actual input of the individual parties and has vast number of resources and randomization function is known to get the actual data for computation of final result. In this environment the users are interested in designing a protocol that outsources computation to TTP.
Download Now

Find By Topic