scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
05 Mar 2020
TL;DR: This paper proposes to conceptualize distributed ledger technologies as trust mechanisms, and explores relations between trust and Blockchain design based on theories of e-commerce, business networks, and trust.
Abstract: In the current discussions around Blockchain and distributed ledger technologies, we find a lack of theory to conceptualize and understand application scenarios. In this paper we propose to conceptualize distributed ledger technologies as trust mechanisms. Whereas previously one had to rely on a trusted third party (e.g. notary), now one must trust a complex software system – the Blockchain and distributed ledger application– as well as the parties that host the software system and ensure its effectiveness. Based on theories of e-commerce, business networks, and trust, we explore relations between trust and Blockchain design. We analyze three case studies of Blockchain applications in the diamond industry. In each case we study two complementary research questions: (1) how does the blockchain application influence trust, and (2) how do trust based requirements affect the design of a blockchain application? We formulate two propositions and find dynamic interactions between trust requirements, blockchain application design, and transaction trust.

22 citations

Proceedings ArticleDOI
29 Nov 2010
TL;DR: A novel suite of algorithms called MobiPriv is introduced that guarantees a 100% success rate of processing a mobile request using k-anonymity with diversity considerations and is evaluated experimentally against previously proposed anonymization algorithms.
Abstract: With the rapid advancement of positioning and tracking capabilities (mobile phones, on-board navigation systems) location based services are rapidly increasing. Privacy in location based systems is addressed in many papers. Our work is focused on the trusted third party privacy framework that utilizes the concept of k-anonymity with or without l-diversity. In previous anonymization models k may be defined as a personalization parameter of the mobile user or as uniform system parameter for all mobile users . Clearly, k other users may not be available at the time of request in these systems. These requests are discarded because the quality of service (QoS) they require cannot be satisfied. In this paper we introduce a novel suite of algorithms called MobiPriv that guarantees a 100% success rate of processing a mobile request using k-anonymity with diversity considerations. We evaluated our suite of algorithms experimentally against previously proposed anonymization algorithms using real world traffic volume data, real world road network and mobile users generated realistically by a mobile object generator.

22 citations

Patent
11 Jun 2010
TL;DR: To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, the public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before being made publicly available as mentioned in this paper.
Abstract: To mitigate the effects of a weak random number generator (RNG) in a public key cryptosystem, a public key obtained from the RNG is encrypted using a deterministic cryptographic scheme before being made publicly available A trusted party receiving the encrypted public key can recover the public key and combine it with other information so it is not subject to direct scrutiny In one embodiment, the trusted party incorporates the public key in a certificate, such as an implicit certificate, for use by the correspondents in other communications

22 citations

Proceedings ArticleDOI
02 May 2004
TL;DR: This paper proposes a strategy proof trust management system fitting to wireless ad hoc networks that is incentive compatible in which nodes can honestly report trust evidence and truthfully compute and broadcast trust value of themselves and other nodes.
Abstract: Trust management is a basic component for wireless ad hoc networks. Some existing trust management mainly aims at. Internet application and generally depends on a centralized trusted third party. The inherent characteristics of a wireless ad hoc network mounts more of a challenge to the design and deployment of trust management in wireless ad hoc networks. This paper proposes a strategy proof trust management system fitting to wireless ad hoc networks. This system is incentive compatible in which nodes can honestly report trust evidence and truthfully compute and broadcast trust value of themselves and other nodes.

22 citations

Patent
28 Jun 2006
TL;DR: In this paper, a system for anonymous communication where a first party, subscriber, stores private contact address information with a server controlled by a trusted third party is described, and the subscriber is associated with a token in the server database.
Abstract: A system for anonymous communication wherein a first party, subscriber, stores private contact address information with a server controlled by a trusted third party. The subscriber is associated with a token in the server database. The subscriber may publish the token with information of interest to a second party. The second party may then contact the server and provide the token. The server then enables communications between the first and second parties without either knowing the necessary contact information to independently make contact. The token may be published in any media and may be used to establish connection with email, voice, voice mail, e-chat rooms, or other communication media. In one embodiment, the third party may establish an account with the first party and may charge the first party for the communication service.

22 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177