A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Multi-Party Computation without Agreement
2005
Journal of Cryptology
That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted preprocessing phase as required ...
We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever ...
Security in multi-party computation. A number of different definitions were proposed for secure multi-party computation (e.g., [38, 26, 6, 27, 1, 34, 9] ). ...
doi:10.1007/s00145-005-0319-z
fatcat:i2narlrnsjahplxte6po2wo4by
Secure Computation without Agreement
[chapter]
2002
Lecture Notes in Computer Science
Indeed, we prove that secure multi-party computation can be achieved for any number of corrupted parties and without a broadcast channel (or trusted preprocessing phase as required for running authenticated ...
In particular, this is true for the whole body of work of secure multi-party protocols in the case that 1/3 or more of the parties are corrupted. ...
Thus, the lower bounds for Byzantine agreement indeed do not imply lower bounds for secure multi-party computation. ...
doi:10.1007/3-540-36108-1_2
fatcat:gdsqn5o3w5eipcb5oo4szcly2q
Secure Group Communication Using Fractional Public Keys
2010
2010 International Conference on Availability, Reliability and Security
The scheme provides therefore an efficient and elegant way of multi-party key agreement without key establishment data transmissions. ...
In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. ...
Hence, the scheme provides secure multi-party key agreement with the advantage that secret group keys can be computed without user interaction and key establishment data transmissions. ...
doi:10.1109/ares.2010.13
dblp:conf/IEEEares/EskelandO10
fatcat:dlo6hm6kh5cerp3fw44je6y5vm
Promoting Data Circulation by Secure Multi-party Computation and Blockchain
2018
DEStech Transactions on Computer Science and Engineering
The application of blockchain and secure multi-party computation (SMPC) provide enlightening solutions for solving these problems. ...
This paper discusses the implementation framework of secure multiparty computation. The main idea of authorized deposit certificate and data traceability using blockchain were discussed. ...
The research of SMPC is mainly aimed at secure multi-party cooperative computation without trusted third party. ...
doi:10.12783/dtcse/ceic2018/24542
fatcat:nembp5h765cvxbuqbm2g3rushy
Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision
2016
International Journal of Software Engineering and Its Applications
This paper focuses on Hybrid Cloud Computing security in the context of a Tenant-Vendor-Third-Party environment and service level agreements. ...
With the expanding hybrid cloud model offering better services and convenience there are also a number of security problems associated with cloud standardization, multi-tenancy third party privity/sub-contracting ...
It is considered to be a security threat as well because outsourcing is being done by the vendor with or without the tenants consent, increasing the risks associated to privacy, data-controller, multi-tenancy ...
doi:10.14257/ijseia.2016.10.12.37
fatcat:tukb32cuazdjljtngra3ukc3xi
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
[chapter]
2005
Lecture Notes in Computer Science
Recently, Boneh and Silverberg [4] studied a one round multi-party key agreement protocols using the certificates from multilinear forms. ...
In this paper, we propose new ID-based multi-party authenticated key agreement protocols, which use the identity information of a user as his long-term public/private key, from multilinear forms. ...
Section 3 also describes one round multi-party authenticated key agreement protocols using multilinear. ...
doi:10.1007/11556992_8
fatcat:bptx5cxqb5csndyvtry63nqwjq
Multi Decryption Key Agreement in Dynamic Peer Group
2017
DEStech Transactions on Computer Science and Engineering
In this paper, we consider a class of protocols that we call natural extensions of multi decryption key to the n-party case for distributed networks. ...
Ever since multi decryption key agreement was first proposed in 2002, there have been efforts to extend its simplicity and elegance to group communication, it has some advantages in rekeying comparing ...
The 2-party multi encryption key is extended to n parties. ...
doi:10.12783/dtcse/cnsce2017/8881
fatcat:6vujrvs42bf7ddtbdhwn7xunuy
A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment
2015
KSII Transactions on Internet and Information Systems
Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. ...
Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. ...
Security requirements Secure communication schemes for remote one-way authentication and session key agreement for the multi-server architecture should provide security requirements [24] : (1) One-way ...
doi:10.3837/tiis.2015.02.019
fatcat:nsrropw2wncl7gevqi24uklhji
Graceful Degradation in Multi-Party Computation (Extended Abstract)
[chapter]
2011
Lecture Notes in Computer Science
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. ...
The first general solution was provided in [GMW87], where, based on computational intractability assumptions, security against a passive adversary was achieved for t < n corruptions, and security against ...
., efficiency) with graceful degradation of security and corruption types (e.g. fail-corruption), as well as to consider other security models (e.g. computational security). ...
doi:10.1007/978-3-642-20728-0_15
fatcat:3owrpabzsbgatcfqjn4vmsuaza
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings
[chapter]
2006
Lecture Notes in Computer Science
research, in the School of Information Technology and Computer Science, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. ...
All Rights Reserved ii Dedicated to my parents iii Declaration I, Lan Zhou, declare that this thesis, submitted in partial fulfilment of the requirements for the award of Master of Computer Science by ...
Hence we implement an efficient ID-based Authenticated Group Key Agreement (AGKA) scheme, from which we can construct a multi-party SH scheme. ...
doi:10.1007/11943952_44
fatcat:rlhvi7dsoncirg7dq3vgmzngte
Hierarchical Multi-Party Key Agreement for Wireless Networks
2007
Third International Symposium on Information Assurance and Security
In this paper, we present an efficient hierarchical multi-party key agreement protocol that is wellsuitable for wireless networks. ...
A common property of practically all multi-party key agreement protocols is that they are non-hierarchical, i.e., they do not support user hierarchies. ...
Security properties The security properties of the hierarchical multi-party key agreement protocol presented in Section 4 are as follows: • Class key confidentiality. ...
doi:10.1109/isias.2007.4299748
fatcat:d7dl5ntnijdzddhtqqjb5hoibm
Leveraging the "Multi" in secure multi-party computation
2003
Proceeding of the ACM workshop on Privacy in the electronic society - WPES '03
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. ...
secure multi-party protocol. ...
However, secure multi-party computations are not as well explored. ...
doi:10.1145/1005140.1005149
dblp:conf/wpes/VaidyaC03
fatcat:u7ebrxm3xba2zpxn57jcwiofqm
Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment
2015
IJARCCE
Cloud computing is a new computing model which enables individuals and organizations to gain access to huge computing resources without capital investment. ...
Therefore people have security concerns on data storage security of cloud computing. Many techniques have been proposed in the literature for ensuring data storage security in cloud computing. ...
In [2] a third party auditing mechanism is implemented in order to secure cloud storage. Continuous correctness of data is the SLA (Service Level Agreement) implemented in this paper. ...
doi:10.17148/ijarcce.2015.48110
fatcat:c2yaskmbo5bgff7i3xxkurx3le
An E-commerce Agreement Based on the Points System of the Blockchain and the Secure Multi-party Platform
2021
E3S Web of Conferences
on the multi-party secure data platform, but also maintains the confidentiality of the calculation verification and input data. ...
security computing technology in the field of e-commerce. ...
multi-party secure computing platform). ...
doi:10.1051/e3sconf/202125303009
doaj:be1b535ddc764f9cbfee9295dcda0b5d
fatcat:k3zmfuvyfbc4pctocut6f6lizm
A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party
2016
International Journal of Security and Its Applications
To the best of the authors' knowledge, the CLAKA protocol under client-server environment without the third-party (i.e., KGC) is seldom discussed. ...
In order to reduce the heavy trust reliance on key generator center (KGC) in identity based AKA protocols, a certificateless based AKA (CLAKA) protocol for client-server environment without the third-party ...
environment without the third-party is introduced, which reduces the heavy trust reliance on KGC. ...
doi:10.14257/ijsia.2016.10.10.20
fatcat:4ouqcztglngtbcniwpapvnsufq
« Previous
Showing results 1 — 15 out of 67,523 results