Visible to the public Secure multi-party computation protocol using asymmetric encryption

TitleSecure multi-party computation protocol using asymmetric encryption
Publication TypeConference Paper
Year of Publication2014
AuthorsShukla, S., Sadashivappa, G.
Conference NameComputing for Sustainable Global Development (INDIACom), 2014 International Conference on
Date PublishedMarch
Keywordsanonymity, anonymization, Asymmetric Encryption, asymmetric encryption scheme, asymmetric secure multiparty computation protocol, confidentiality, cryptographic protocols, data privacy, decryption key, Encryption, financial analysis, individual privacy, Joints, medical science, message encryption, packetization, privacy, privacy preservation, private key, private key cryptography, protocol design, Protocols, Public key, public key cryptography, public-key encryption, Secure Multi-Party Computation (SMC), security, trusted third party, trusted third party (TTP), TTP

Privacy preservation is very essential in various real life applications such as medical science and financial analysis. This paper focuses on implementation of an asymmetric secure multi-party computation protocol using anonymization and public-key encryption where all parties have access to trusted third party (TTP) who (1) doesn't add any contribution to computation (2) doesn't know who is the owner of the input received (3) has large number of resources (4) decryption key is known to trusted third party (TTP) to get the actual input for computation of final result. In this environment, concern is to design a protocol which deploys TTP for computation. It is proposed that the protocol is very proficient (in terms of secure computation and individual privacy) for the parties than the other available protocols. The solution incorporates protocol using asymmetric encryption scheme where any party can encrypt a message with the public key but decryption can be done by only the possessor of the decryption key (private key). As the protocol works on asymmetric encryption and packetization it ensures following: (1) Confidentiality (Anonymity) (2) Security (3) Privacy (Data).

Citation Key6828069