A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol
2012
International Journal of Security Privacy and Trust Management
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to
doi:10.5121/ijsptm.2012.1306
fatcat:nn5o4qxyebdk3avqcdbybzuvxa