Secure Multiparty Computation

Download Now
Provided by: ISR JOURNALS
Topic: Security
Format: PDF
In Secure Multiparty Computation (SMC) model, each processes contain a tamper-proof security module. Security modules can be trusted by other processes and can establish secure channels between each hosts. The availability of security modules is restricted by their hosts because a corrupted party can stop the execution of its own security module and also drop message sent by or to its security module. The authors show that SMC can be implemented to reduce faults based on the security modules of its own.
Download Now

Find By Topic