一个零黑客协议,用于使用多个http的安全多方计算

D. Mishra, M. Chandwani
{"title":"一个零黑客协议,用于使用多个http的安全多方计算","authors":"D. Mishra, M. Chandwani","doi":"10.1109/TENCON.2008.4766515","DOIUrl":null,"url":null,"abstract":"We present a solution to the Secure Multi-party Computation (SMC) problem in the form of a protocol that ensures zero-hacking. The solution comprises of a protocol with several trusted third parties (TTPs) where there is a possibility of threat to the security. Our protocol unanimously selects one TTP among all TTPs in the SMC architecture that owns the responsibility of all the computation in the system. This TTP is called the master TTP and it is different at different times. The procedure of selecting master TTP could be non-deterministic but it is made deterministic by randomization technique. This ensures that no single TTP controls the entire system all the times. At the same time, this also ensures that no TTP knows where the computation is taking place. This approach is having merit over the other one where only one TTP is given the responsibility to hold entire data of the system. Hence, the chances of corruption can be reduce to negligible when we randomize the selection of one TTP instead of having unknown TTP. Our algorithm works on the concepts of multiple TTP to provide zero-hacking for the entire system owing to the situation that it becomes almost impossible for any party to break the security. Formally it is achieved by imposing high computational complexity on the parties.","PeriodicalId":22230,"journal":{"name":"TENCON 2008 - 2008 IEEE Region 10 Conference","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A zero-hacking protocol for secure multiparty computation using multiple TTP\",\"authors\":\"D. Mishra, M. Chandwani\",\"doi\":\"10.1109/TENCON.2008.4766515\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a solution to the Secure Multi-party Computation (SMC) problem in the form of a protocol that ensures zero-hacking. The solution comprises of a protocol with several trusted third parties (TTPs) where there is a possibility of threat to the security. Our protocol unanimously selects one TTP among all TTPs in the SMC architecture that owns the responsibility of all the computation in the system. This TTP is called the master TTP and it is different at different times. The procedure of selecting master TTP could be non-deterministic but it is made deterministic by randomization technique. This ensures that no single TTP controls the entire system all the times. At the same time, this also ensures that no TTP knows where the computation is taking place. This approach is having merit over the other one where only one TTP is given the responsibility to hold entire data of the system. Hence, the chances of corruption can be reduce to negligible when we randomize the selection of one TTP instead of having unknown TTP. Our algorithm works on the concepts of multiple TTP to provide zero-hacking for the entire system owing to the situation that it becomes almost impossible for any party to break the security. Formally it is achieved by imposing high computational complexity on the parties.\",\"PeriodicalId\":22230,\"journal\":{\"name\":\"TENCON 2008 - 2008 IEEE Region 10 Conference\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TENCON 2008 - 2008 IEEE Region 10 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TENCON.2008.4766515\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TENCON 2008 - 2008 IEEE Region 10 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENCON.2008.4766515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

我们提出了一种解决安全多方计算(SMC)问题的方案,以保证零黑客攻击的协议形式。该解决方案包括与几个可能存在安全威胁的可信第三方(TTPs)的协议。我们的协议在SMC架构的所有TTP中一致选择一个TTP,该TTP负责系统中的所有计算。这个TTP被称为主TTP,它在不同的时间是不同的。主TTP的选择过程可能是不确定的,但通过随机化技术使其具有确定性。这确保了没有任何一个TTP一直控制整个系统。同时,这也确保了没有TTP知道计算发生在哪里。这种方法比另一种方法有优点,在另一种方法中,只有一个http负责保存系统的整个数据。因此,当我们随机选择一个TTP而不是未知的TTP时,损坏的机会可以减少到可以忽略不计。我们的算法基于多个http的概念,为整个系统提供零黑客攻击,因为任何一方都几乎不可能破坏安全。形式上,它是通过对各方施加高计算复杂度来实现的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A zero-hacking protocol for secure multiparty computation using multiple TTP
We present a solution to the Secure Multi-party Computation (SMC) problem in the form of a protocol that ensures zero-hacking. The solution comprises of a protocol with several trusted third parties (TTPs) where there is a possibility of threat to the security. Our protocol unanimously selects one TTP among all TTPs in the SMC architecture that owns the responsibility of all the computation in the system. This TTP is called the master TTP and it is different at different times. The procedure of selecting master TTP could be non-deterministic but it is made deterministic by randomization technique. This ensures that no single TTP controls the entire system all the times. At the same time, this also ensures that no TTP knows where the computation is taking place. This approach is having merit over the other one where only one TTP is given the responsibility to hold entire data of the system. Hence, the chances of corruption can be reduce to negligible when we randomize the selection of one TTP instead of having unknown TTP. Our algorithm works on the concepts of multiple TTP to provide zero-hacking for the entire system owing to the situation that it becomes almost impossible for any party to break the security. Formally it is achieved by imposing high computational complexity on the parties.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Measured impedance by distance relay for inter phase faults in presence of SSSC on a double circuit transmission line A parallel architecture for successive elimination block matching algorithm An RNS based transform architecture for H.264/AVC Routing protocol enhancement for handling node mobility in wireless sensor networks MPEG-21-based scalable bitstream adaptation using medium grain scalability
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1