International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P103 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P103

Secure Multi Party Computation For Participating Parties


Ruby S, Mr Raja Varman

Citation :

Ruby S, Mr Raja Varman, "Secure Multi Party Computation For Participating Parties," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 463-466, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I4P103

Abstract

In this paper secure multi party computation parties together compute their private inputs, same time these inputs are kept secured. We also propose SMC problems along with some solutions. It provides detailed work conclusion about SMC. Therefore, keeping the data together and provide collaborate computations without revealing data of individual.

Keywords

Security, Trusted Third Party, Secure Multiparty Computation.

References

[1] D.K. Mishra and M. Chandwani,”Anonymity Enabled Secure Multiparty Computation for Indian BPO”. In Proceeding of the IEEE Tencon 2007: International conference on Intelligent Information Communication Technologies for Better Human Life, Taipei, Taiwan on 29 Oct. - 02 Nov. 2007, pp. 52-56.
[2] Rebecca Wright, “Progress on the PORTIA Project in Privacy Preserving Data Mining,” A data surveillance and privacy protection workshop held on 3rd June 2008.
[3] Wenliang Du and Mikhail J. Atallah,”Secure Multiparty Computation Problems and their Applications: A review and Open Problems,” Tech. Report CERIAS Tech Report 2001-51, Center for Education and Research in Information Assurance and Security and Department of Computer Sciences, Purdue University, West Lafayette, IN 47906, 2001.
[4] Jaideep Vaidya and Chris Clifton, “Leveraging the ‘multi’ in Secure Multiparty Computation,” WPES’03 October 30, 2003, Washington, DC, USA, ACM Transaction 2003, pp120-128. 
[5] Andrew C. Yao,”Protocols for Secure Computations”, In Proc. 23rd IEEE Symposium on the Foundation of Computer Science (FOCS), IEEE 1982, pp 160-164.
[6] Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, ”Tools for Privacy Preserving Data Mining”. international conference on knowledge discovery and data mining, Vol. 4, No. 2,  2002, pp. 1-8. 
[7] Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parsiliti Provenza, Yucel Saygin, Yannis Theodoridis, “State-of- The-Art in Privacy Preserving Data Mining”, SIGMOD Record, Vol. 33, No. 1, March 2004.
[8] Y.C.Yao, “How Generate and Exchange Secrets”. In proceedings of the IEEE Symposium on Foundation of Computer Science IEEE, 1986, Pages 162-167. 
[9] O.Goldreich, “Secure Multiparty Computation”, September 1998 (Working draft) Online available on: http://www.wisdom.weizmann.ac.il/~oded/pp.html.
[10] R.Agrawal and R.Srikant, “Fast Algorithms for Mining Association Rules”, in the proceedings of the 20th  International Conference on Very Large Databases (VLDB), Santiago, Chile, September 12-15 1994.
[11] Y.Lindell and B. Pinkas, “Privacy Preserving Data Mining”. In advances in Cryptography-CRYPTO-2000, pp 36-54, Springer- Verlag, August 24 2000.
[12] Y.Lindell, IBM T J Watson “Tutorial on Secure Multiparty Computation”, available wesite:- http://www.cs.biu.ac.il/~lindell/research-statements/tutorials