TENCON 2009 - 2009 IEEE Region 10 Conference 2009
DOI: 10.1109/tencon.2009.5395855
|View full text |Cite
|
Sign up to set email alerts
|

Malicious computation prevention protocol for secure multi-party computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…In order to realize a secure multi-party protocol using anonymization, Shukla et al [26] combined an asymmetric encryption scheme and it relies on the existence of a credible third party, but it is difficult to find a credible third party in practical. Secure multiparty computation protocol require higher safety at malicious model, in order to prevent the malicious adversary departing protocol breach security protocol, Mishra et al [27] extended the Encrytpo Random protocol to introduce multiple trusted third parties, such that the security of the data is further guaranteed, and an attempt is made to further strengthen the existing protocol, thereby paving the way for a safer multi-party computation process. For the practical application of SMPC, Naidu et al [28] combined cryptography and secure multi-party computation technology to create an electronic voting system, which has high research value and significance.…”
Section: Related Workmentioning
confidence: 99%
“…In order to realize a secure multi-party protocol using anonymization, Shukla et al [26] combined an asymmetric encryption scheme and it relies on the existence of a credible third party, but it is difficult to find a credible third party in practical. Secure multiparty computation protocol require higher safety at malicious model, in order to prevent the malicious adversary departing protocol breach security protocol, Mishra et al [27] extended the Encrytpo Random protocol to introduce multiple trusted third parties, such that the security of the data is further guaranteed, and an attempt is made to further strengthen the existing protocol, thereby paving the way for a safer multi-party computation process. For the practical application of SMPC, Naidu et al [28] combined cryptography and secure multi-party computation technology to create an electronic voting system, which has high research value and significance.…”
Section: Related Workmentioning
confidence: 99%
“…In order to realize a secure multiparty protocol using anonymization, Shukla and Sadashivappa (2014) combined an asymmetric encryption scheme, and it relies on the existence of a credible third party, but it is difficult to find a credible third party in practical. A secure multiparty computation protocol requires greater safety with malicious model, in order to prevent the malicious adversary from departing from protocol or breaching security protocol, Mishra, Koria, et al (2009) extended the Encrytpo_Random protocol to introduce multiple trusted third parties, such that the security of the data is further guaranteed and attempted to further strengthen the existing protocol, thereby paving the way for a safer multiparty computation process. For the practical application of SMPC, Naidu et al (2016) combined cryptography and secure multiparty computation technology to create an electronic voting system, which has high research value and significance.…”
Section: Introductionmentioning
confidence: 99%