Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

Zulfa Shaikh
2012 International Journal of Security Privacy and Trust Management  
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to
more » ... ntain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.
doi:10.5121/ijsptm.2012.1306 fatcat:nn5o4qxyebdk3avqcdbybzuvxa