Survey on application models and usage scenarios for various SMC protocols
نویسندگان
چکیده
European Union funded research project Usable and Efficient Secure Multiparty Computation (UaESMC) deliverable D1.1 [11] lists various application scenarios where secret sharing based secure multiparty computation (SMC) can be used. Inspired by their results, this work tries to add one more level of abstraction and compare different secure evaluation techniques from the point of applicability in different scenarios. We will consider the most suitable and most motivated case for each SMC technique and argue if and how other SMC techniques could be used to solve them.
منابع مشابه
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation
In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical approach to SMC is to perform computa...
متن کاملExtracting More Object Usage Scenarios for API Protocol Mining
Automatic protocol mining is a promising approach to infer precise and complete API protocols. However, the effect of the approach largely depends upon the quality of input object usage scenarios, in terms of noise and diversity. This paper aims to extract as many object usage scenarios as possible from object-oriented programs for automatic protocol mining. A large corpus of object usage scena...
متن کاملMobility Models for Delay Tolerant Network: a Survey
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and application protocols are highly dependent on the underlying mobility of nodes and its characteristics. Th...
متن کاملComparison of LARS-WG and SDSM Downscaling Models for Prediction Temperature and Precipitation Changes under RCP Scenarios
Various methods developed to convert large-scale data to regional climatic data. In few studies , the results of these methods have been statistically compared. The main purpose of this study was to compare SDSM and LARS-WG models for Downscaling output data of CANE-SM2 and HADGEM2-ES general circulation models under RCP2.6, RCP4.5 and RCP8.5 scenarios. For this study, precipitation, minimum an...
متن کاملEvaluating Intrusion-Tolerant Certification Authority Systems
Various intrusion-tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion-tolerant CA system evaluation, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013