Secure Multi Party Computation For Participating Parties

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors :Ruby S, Mr Raja Varman

MLA

Ruby S, Mr Raja Varman "Secure Multi Party Computation For Participating Parties"International Journal of Computer Trends and Technology (IJCTT),V4(4):463-466 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -In this paper secure multi party computation parties together compute their private inputs, same time these inputs are kept secured. We also propose SMC problems along with some solutions. It provides detailed work conclusion about SMC. Therefore, keeping the data together and provide collaborate computations without revealing data of individual.

References-

[1] D.K. Mishra and M. Chandwani,”Anonymity Enabled Secure Multiparty Computation for Indian BPO”. In Proceeding of the IEEE Tencon 2007: International conference on Intelligent Information Communication Technologies for Better Human Life, Taipei, Taiwan on 29 Oct. - 02 Nov. 2007, pp. 52-56.
[2] Rebecca Wright, “Progress on the PORTIA Project in Privacy Preserving Data Mining,” A data surveillance and privacy protection workshop held on 3rd June 2008.
[3] Wenliang Du and Mikhail J. Atallah,”Secure Multiparty Computation Problems and their Applications: A review and Open Problems,” Tech. Report CERIAS Tech Report 2001-51, Center for Education and Research in Information Assurance and Security and Department of Computer Sciences, Purdue University, West Lafayette, IN 47906, 2001.
[4] Jaideep Vaidya and Chris Clifton, “Leveraging the ‘multi’ in Secure Multiparty Computation,” WPES’03 October 30, 2003, Washington, DC, USA, ACM Transaction 2003, pp120-128.

Keywords — Security, Trusted Third Party, Secure Multiparty Computation