A Trusted Third-Party Computation Service

نویسندگان

  • Sameer Ajmani
  • Robert Morris
  • Barbara Liskov
چکیده

We present TEP, a system that supports general-purpose shared computation between mutually-distrusting parties. TEP is useful for applications, such as auctions and tax preparation, that use private information from multiple participants. Such applications cannot be run on any one participant’s computer without sacrificing the other participants’ privacy. TEP acts as a trusted service that hosts the sensitive parts of such applications. TEP uses a Java VM to load and run computations on behalf of clients. TEP uses Java security mechanisms and cryptographic protocols to ensure that (1) a program can communicate only with the specific participants identified for a computation and (2) each participant knows exactly what program is being run and who the other participants are. This lets participants determine whether information they send to the computation can be exposed to other participants; we show how static analysis greatly simplifies this task. Example programs show that the TEP model is useful and easy to program; benchmarks show that the TEP prototype implementation is fast enough to be practical.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Security for Mobile Code

This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with “encrypted functions” is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the...

متن کامل

Third Party Privacy Preserving Protocol for Secure Web Services

Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...

متن کامل

Electronic Contract Signing Without Using Trusted Third Party

Electronic contract signing allows two potentially dis-trustful parties to digitally sign an electronic document “simultaneously” across a network. Existing solutions for electronic contract signing either require the involvement of a trusted third party (TTP), or are complex and expensive in communication and computation. In this paper we propose an electronic contract signing protocol between...

متن کامل

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...

متن کامل

Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation

Secure sum computation of private data inputs is an important component of Secure Multi-party Computation (SMC).In this paper we provide a protocol to compute the sum of individual data inputs with zero probability of data leakage. In our proposed protocol we break input of each party into number of segments and change the arrangement of the parties such that in each round of the computation th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001