Filters








67,523 Hits in 4.7 sec

Secure Multi-Party Computation without Agreement

Shafi Goldwasser, Yehuda Lindell
2005 Journal of Cryptology  
That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted preprocessing phase as required  ...  We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever  ...  Security in multi-party computation. A number of different definitions were proposed for secure multi-party computation (e.g., [38, 26, 6, 27, 1, 34, 9] ).  ... 
doi:10.1007/s00145-005-0319-z fatcat:i2narlrnsjahplxte6po2wo4by

Secure Computation without Agreement [chapter]

Shafi Goldwasser, Yehuda Lindell
2002 Lecture Notes in Computer Science  
Indeed, we prove that secure multi-party computation can be achieved for any number of corrupted parties and without a broadcast channel (or trusted preprocessing phase as required for running authenticated  ...  In particular, this is true for the whole body of work of secure multi-party protocols in the case that 1/3 or more of the parties are corrupted.  ...  Thus, the lower bounds for Byzantine agreement indeed do not imply lower bounds for secure multi-party computation.  ... 
doi:10.1007/3-540-36108-1_2 fatcat:gdsqn5o3w5eipcb5oo4szcly2q

Secure Group Communication Using Fractional Public Keys

Sigurd Eskeland, Vladimir Oleshchuk
2010 2010 International Conference on Availability, Reliability and Security  
The scheme provides therefore an efficient and elegant way of multi-party key agreement without key establishment data transmissions.  ...  In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys.  ...  Hence, the scheme provides secure multi-party key agreement with the advantage that secret group keys can be computed without user interaction and key establishment data transmissions.  ... 
doi:10.1109/ares.2010.13 dblp:conf/IEEEares/EskelandO10 fatcat:dlo6hm6kh5cerp3fw44je6y5vm

Promoting Data Circulation by Secure Multi-party Computation and Blockchain

SHU YAN, CHENG-CHENG LIU, MIAO-QIONG WANG, PENG-WEI MA, KAI WEI
2018 DEStech Transactions on Computer Science and Engineering  
The application of blockchain and secure multi-party computation (SMPC) provide enlightening solutions for solving these problems.  ...  This paper discusses the implementation framework of secure multiparty computation. The main idea of authorized deposit certificate and data traceability using blockchain were discussed.  ...  The research of SMPC is mainly aimed at secure multi-party cooperative computation without trusted third party.  ... 
doi:10.12783/dtcse/ceic2018/24542 fatcat:nembp5h765cvxbuqbm2g3rushy

Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision

Lubna Luxmi Dhirani, Thomas Newe, Shahzad Nizamani
2016 International Journal of Software Engineering and Its Applications  
This paper focuses on Hybrid Cloud Computing security in the context of a Tenant-Vendor-Third-Party environment and service level agreements.  ...  With the expanding hybrid cloud model offering better services and convenience there are also a number of security problems associated with cloud standardization, multi-tenancy third party privity/sub-contracting  ...  It is considered to be a security threat as well because outsourcing is being done by the vendor with or without the tenants consent, increasing the risks associated to privacy, data-controller, multi-tenancy  ... 
doi:10.14257/ijseia.2016.10.12.37 fatcat:tukb32cuazdjljtngra3ukc3xi

ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms [chapter]

Hyung Mok Lee, Kyung Ju Ha, Kyo Min Ku
2005 Lecture Notes in Computer Science  
Recently, Boneh and Silverberg [4] studied a one round multi-party key agreement protocols using the certificates from multilinear forms.  ...  In this paper, we propose new ID-based multi-party authenticated key agreement protocols, which use the identity information of a user as his long-term public/private key, from multilinear forms.  ...  Section 3 also describes one round multi-party authenticated key agreement protocols using multilinear.  ... 
doi:10.1007/11556992_8 fatcat:bptx5cxqb5csndyvtry63nqwjq

Multi Decryption Key Agreement in Dynamic Peer Group

Jian ZHOU, Li-yan SUN
2017 DEStech Transactions on Computer Science and Engineering  
In this paper, we consider a class of protocols that we call natural extensions of multi decryption key to the n-party case for distributed networks.  ...  Ever since multi decryption key agreement was first proposed in 2002, there have been efforts to extend its simplicity and elegance to group communication, it has some advantages in rekeying comparing  ...  The 2-party multi encryption key is extended to n parties.  ... 
doi:10.12783/dtcse/cnsce2017/8881 fatcat:6vujrvs42bf7ddtbdhwn7xunuy

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

2015 KSII Transactions on Internet and Information Systems  
Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation.  ...  Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals.  ...  Security requirements Secure communication schemes for remote one-way authentication and session key agreement for the multi-server architecture should provide security requirements [24] : (1) One-way  ... 
doi:10.3837/tiis.2015.02.019 fatcat:nsrropw2wncl7gevqi24uklhji

Graceful Degradation in Multi-Party Computation (Extended Abstract) [chapter]

Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub
2011 Lecture Notes in Computer Science  
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way.  ...  The first general solution was provided in [GMW87], where, based on computational intractability assumptions, security against a passive adversary was achieved for t < n corruptions, and security against  ...  ., efficiency) with graceful degradation of security and corruption types (e.g. fail-corruption), as well as to consider other security models (e.g. computational security).  ... 
doi:10.1007/978-3-642-20728-0_15 fatcat:3owrpabzsbgatcfqjn4vmsuaza

Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings [chapter]

Lan Zhou, Willy Susilo, Yi Mu
2006 Lecture Notes in Computer Science  
research, in the School of Information Technology and Computer Science, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged.  ...  All Rights Reserved ii Dedicated to my parents iii Declaration I, Lan Zhou, declare that this thesis, submitted in partial fulfilment of the requirements for the award of Master of Computer Science by  ...  Hence we implement an efficient ID-based Authenticated Group Key Agreement (AGKA) scheme, from which we can construct a multi-party SH scheme.  ... 
doi:10.1007/11943952_44 fatcat:rlhvi7dsoncirg7dq3vgmzngte

Hierarchical Multi-Party Key Agreement for Wireless Networks

Sigurd Eskeland, Vladimir Oleshchuk
2007 Third International Symposium on Information Assurance and Security  
In this paper, we present an efficient hierarchical multi-party key agreement protocol that is wellsuitable for wireless networks.  ...  A common property of practically all multi-party key agreement protocols is that they are non-hierarchical, i.e., they do not support user hierarchies.  ...  Security properties The security properties of the hierarchical multi-party key agreement protocol presented in Section 4 are as follows: • Class key confidentiality.  ... 
doi:10.1109/isias.2007.4299748 fatcat:d7dl5ntnijdzddhtqqjb5hoibm

Leveraging the "Multi" in secure multi-party computation

Jaideep Vaidya, Chris Clifton
2003 Proceeding of the ACM workshop on Privacy in the electronic society - WPES '03  
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data.  ...  secure multi-party protocol.  ...  However, secure multi-party computations are not as well explored.  ... 
doi:10.1145/1005140.1005149 dblp:conf/wpes/VaidyaC03 fatcat:u7ebrxm3xba2zpxn57jcwiofqm

Identity Based Approach for Cloud Data Integrity in Multi-Cloud Environment

Ali Mohammed Hameed Al-Saffar
2015 IJARCCE  
Cloud computing is a new computing model which enables individuals and organizations to gain access to huge computing resources without capital investment.  ...  Therefore people have security concerns on data storage security of cloud computing. Many techniques have been proposed in the literature for ensuring data storage security in cloud computing.  ...  In [2] a third party auditing mechanism is implemented in order to secure cloud storage. Continuous correctness of data is the SLA (Service Level Agreement) implemented in this paper.  ... 
doi:10.17148/ijarcce.2015.48110 fatcat:c2yaskmbo5bgff7i3xxkurx3le

An E-commerce Agreement Based on the Points System of the Blockchain and the Secure Multi-party Platform

Hu Jiayi, Xin Peifan, Deng Jiahui, Qian Jiawei
2021 E3S Web of Conferences  
on the multi-party secure data platform, but also maintains the confidentiality of the calculation verification and input data.  ...  security computing technology in the field of e-commerce.  ...  multi-party secure computing platform).  ... 
doi:10.1051/e3sconf/202125303009 doaj:be1b535ddc764f9cbfee9295dcda0b5d fatcat:k3zmfuvyfbc4pctocut6f6lizm

A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party

Liling Cao, Wancheng Ge
2016 International Journal of Security and Its Applications  
To the best of the authors' knowledge, the CLAKA protocol under client-server environment without the third-party (i.e., KGC) is seldom discussed.  ...  In order to reduce the heavy trust reliance on key generator center (KGC) in identity based AKA protocols, a certificateless based AKA (CLAKA) protocol for client-server environment without the third-party  ...  environment without the third-party is introduced, which reduces the heavy trust reliance on KGC.  ... 
doi:10.14257/ijsia.2016.10.10.20 fatcat:4ouqcztglngtbcniwpapvnsufq
« Previous Showing results 1 — 15 out of 67,523 results