Abstract

In secure multi-party computation (SMC), multiple distributed parties jointly carry out the computation over their confidential data without compromising data security and privacy. It is a new emerging cryptographic technique used in huge applications such as electronic auction bidding, electronic voting, protecting personal information, secure transaction processing, privacy preserving data mining, and privacy preserving cooperative control of connected autonomous vehicles. This chapter presents two model paradigms of SMC (i.e., ideal model prototype and real model prototype). It also deals with the type and applications of adversaries, properties, and the techniques of SMC. The three prime types of SMC techniques such as randomization, cryptographic techniques using oblivious transfer, and anonymization methods are discussed and illustrated by protective procedures with suitable examples. Finally, autonomous vehicle interaction leveraged with blockchain technology to store and use vehicle data without any human interaction is also discussed.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call