Secure multi-party computation protocol using asymmetric encryption
Title | Secure multi-party computation protocol using asymmetric encryption |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Shukla, S., Sadashivappa, G. |
Conference Name | Computing for Sustainable Global Development (INDIACom), 2014 International Conference on |
Date Published | March |
Keywords | anonymity, anonymization, Asymmetric Encryption, asymmetric encryption scheme, asymmetric secure multiparty computation protocol, confidentiality, cryptographic protocols, data privacy, decryption key, Encryption, financial analysis, individual privacy, Joints, medical science, message encryption, packetization, privacy, privacy preservation, private key, private key cryptography, protocol design, Protocols, Public key, public key cryptography, public-key encryption, Secure Multi-Party Computation (SMC), security, trusted third party, trusted third party (TTP), TTP |
Abstract | Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data). |
URL | http://ieeexplore.ieee.org/document/6828069/ |
DOI | 10.1109/IndiaCom.2014.6828069 |
Citation Key | 6828069 |
- packetization
- TTP
- trusted third party (TTP)
- trusted third party
- security
- Secure Multi-Party Computation (SMC)
- public-key encryption
- public key cryptography
- Public key
- Protocols
- protocol design
- private key cryptography
- private key
- privacy preservation
- privacy
- anonymity
- message encryption
- medical science
- Joints
- individual privacy
- financial analysis
- encryption
- decryption key
- data privacy
- Cryptographic Protocols
- confidentiality
- asymmetric secure multiparty computation protocol
- asymmetric encryption scheme
- Asymmetric Encryption
- anonymization