Auxiliary Information in Data Privacy and Attacks for Secure Multiparty Protocols

Download Now
Provided by: International Journals of Advanced Information Science and Technology (IJAIST)
Topic: Security
Format: PDF
Secure multiparty protocols have been proposed to enable non-colluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and communication. The high overhead motivates parties to estimate the utility that can be achieved as a result of the protocol beforehand. In this paper, a look-ahead approach, specifically for secure multiparty protocols to achieve distributed k anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol.
Download Now

Find By Topic