Secure Multiparty Computation 4.1.1 Overview of Dining Cryptographers (dc) Problem . . . . . . . . . . . 41 List of Figures

نویسنده

  • Mohammad Dadfar
چکیده

Ray Kresman, Advisor Data mining algorithms help reveal hidden information in a repository. Distributed mining algorithms meet this need by distributing data and computation. One of the most important issues of these algorithms is how to safely mine the data. Secure Multiparty Computation (SMC), a framework for safe mining of distributed data, provides some security promises of the computation. This thesis addresses certain aspects of SMC including the role of Hamiltonian and edge-disjoint Hamiltonian cycles. We formalize the notion of trust in a network and show that certain network configurations are better than others. We propose and analyze an algorithm for id assignment in networks that outperforms an existing algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiparty Computation to Generate Secret Permutations

We make use of a universal re-encryption mixnet to efficiently perform a secure multiparty computation to generate a secret permutation. When complete, the permutation is shared among the players in such a way that each player knows his share of the permutation but no others. Such a permutation is useful in dining cryptographers networks (DC-nets) to determine in which slot each player should t...

متن کامل

GHZ correlation provides secure Anonymous Veto Protocol

Anonymous Veto (AV) and Dining cryptographers (DC) are two basic primitives for the cryptographic problems that can hide the identity of the sender(s) of classical information. They can be achieved by classical methods and the security is based on computational hardness or requires pairwise shared private keys. In this regard, we present a secure quantum protocol for both DC and AV problems by ...

متن کامل

A 2-Round Anonymous Veto Protocol

The dining cryptographers network (or DC-net) is a seminal technique devised by Chaum to solve the dining cryptographers problem — namely, how to send a boolean-OR bit anonymously from a group of participants. In this paper, we investigate the weaknesses of DC-nets, study alternative methods and propose a new way to tackle this problem. Our protocol, Anonymous Veto Network (or AV-net), overcome...

متن کامل

Towards Provably-Secure Scalable Anonymous Broadcast

We devise a scalable and provably-secure protocol for fully-anonymous broadcast in large-scale networks. Similar to the dining cryptographers networks (DCNETS), our algorithm uses secure multi-party computation (MPC) to ensure anonymity. However, we address the weaknesses of DC-NETS, which are poor scalability and vulnerability to jamming attacks. When compared to the state-of-the-art, our prot...

متن کامل

The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability

appeared in: Proceedings of EUROCRYPT'89, LNCS, Springer-Verlag Heidelberg The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability Michael Waidner, Birgit Pfitzmann Universität Karlsruhe, Postfach 6980 D-7500 Karlsruhe 1, F. R. Germany

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009