Loading…
Security Preserving Distributive n-Party Computation
In n-party Computation, data from different sources are integrated to achieve a common goal, which can be beneficial for different applications. However, this goal may be at risk due to the fact that this corresponding data can be the target of attacks from outside attackers as well as inside ones....
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In n-party Computation, data from different sources are integrated to achieve a common goal, which can be beneficial for different applications. However, this goal may be at risk due to the fact that this corresponding data can be the target of attacks from outside attackers as well as inside ones. On the other hand, in Secure n-party Computation, the data can be processed by preserving security and privacy in such a way that no party can know the data of the others. Several schemes have been proposed to address the issues regarding n-party computation. However, some of them are not efficient in terms of computation and communication, or some of them have used a Trusted Initializer (TI), a third party, which is considered as trusted, for communicating between different parties. Therefore, to address these issues, we propose an n-party secure computation protocol without using any Trusted Initializer (TI). We formally simulate our protocol using Automated Verification of Internet Security Protocols and Applications (AVISPA) as well as we elaborate on the formal and informal security analysis of our proposed protocol. Performance analysis of our proposed protocol is also carried out and it is observed our proposed protocol is secure and protects the privacy of the system. |
---|---|
ISSN: | 2159-3450 |
DOI: | 10.1109/TENCON58879.2023.10322504 |