Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

Provided by: Academy & Industry Research Collaboration Center
Topic: Security
Format: PDF
The authors present a solution for identification and reduction of malicious conduct by Trusted Third Parties (TTPs) in secure multiparty computing protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Their protocol uses e-envelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.

Find By Topic