Title :
Malicious computation prevention protocol for secure multi-party computation
Author :
Mishra, Durgesh Kumar ; Koria, Neha ; Kapoor, Nikhil ; Bahety, Ravish
Author_Institution :
Acropolis Inst. of Technol. & Res., Indore, India
Abstract :
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is the second version of a previously proposed protocol Extended_Encrypto_Random, which itself was an extension of the initial work Encrytpo_Random. The former endeavors presented a plain sailing yet effective approach to SMC and also laid forward an aptly crafted architecture, whereby such efficient protocols, involving the parties that have come forward for joint-computations and the third party who undertakes such computations, can be developed. Through this succeeding work an attempt has been made to further strengthen the existing protocols, thus paving the way for a more secure multi-party computational process.
Keywords :
cryptographic protocols; Extended_Encrypto_Random protocol; malicious computation prevention protocol; secure multiparty computation; Computer architecture; Computer networks; Cryptography; Data mining; Data security; Databases; IP networks; Intrusion detection; Protocols; Sliding mode control; Complexity; Decryption; Encryption; Encrytpo_Random; Extended Encrytpo_Random; Pool of function; Random Dissemination; Random Function; Secure Multi-Party Computation (SMC); Trusted Third Party (TTP);
Conference_Titel :
TENCON 2009 - 2009 IEEE Region 10 Conference
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-4546-2
Electronic_ISBN :
978-1-4244-4547-9
DOI :
10.1109/TENCON.2009.5395855