2012 | OriginalPaper | Chapter
Single and Multi Trusted Third Party: Comparison, Identification and Reduction of Malicious Conduct by Trusted Third Party in Secure Multiparty Computing Protocol
Authors : Zulfa Shaikh, Poonam Garg
Published in: Advances in Computer Science, Engineering & Applications
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
SMC is a problem of n parties with inputs (x
1
, x
2
…x
n
) , hand over their inputs to third party for computation f(x
1
, x
2
…x
n
) and third party announces the result in the form of y. During joint computation of inputs, all the organizations involved in computation wish to preserve privacy of their inputs. So need is to define a protocol which maintains privacy, security and correctness parameters of SMC. In this paper, single third party and multi third party model are defined and compared. The probabilistic evidences for single and multi third party SMC model have been analyzed with security analysis graphs. In this paper, we have also worked on identification and reduction of malicious conduct of TTPs in multi TTP environment.