Abstract

We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis of RSA algorithm. This ensures that parties send their data in encrypted manner to TTPs in order to maintain privacy and security of inputs. Also, single and multi trusted third party model is compared and the probabilistic evidences for them have been analyzed with security analysis graphs.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call