scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Patent
10 Dec 2014
TL;DR: In this paper, a cloud data integrity verification method based on a trusted third party is proposed, where a data owner partitions data and signs on the data to obtain data integrity metadata stored in the trusted third-party.
Abstract: The invention discloses a cloud data integrity verification method based on a trusted third party. The method includes the steps: a data owner partitions data and sign on the data to obtain data integrity metadata stored in the trusted third party; the trusted third party communicates with a cloud server through a challenge/response protocol to verify data integrity. Compared with the prior art, the method has the advantages that integrity of data stored in the cloud server is verified on the premise that the user has no access to original data, information that the data owner uses to verify data integrity is not leaked, accuracy in cloud data integrity verification can also be guaranteed while a cloud service provider is untrusted, and practicality is high.

16 citations

Patent
03 Oct 2011
TL;DR: In this article, the authors describe a system and methods that enable a first party, such as a child, to selected one or more items offered by an online retailer and to send a request to a second party such a parent or guardian, to request that the second party purchase the item or items for the first party.
Abstract: Systems and methods are disclosed herein which that enable a first party, such as a child, to selected one or more items offered by an online retailer and to send a request to a second party, such as a parent or guardian, to request that the second party purchase the item or items for the first party. The systems and methods provide the second party with the ability to view requests received from the first party, to set limits on the number of requests and the amounts of the requests that the first party may make. The second party may also designate the parties to whom the first party may submit purchase requests. The child may also submit request to one or more non-parental contributors who may contribute money toward the purchase the one or more items for the child.

16 citations

Proceedings ArticleDOI
01 Apr 1999
TL;DR: This paper describes how the trusted third party can be involved in the negotiation of multi-agent coordination to deal with many difficult game situations and introduces two communication actions into the traditional game-theoretical reasoning: asking guarantee and offering compensation for agents to use in negotiation.
Abstract: In multi-agent coordination, one would normally like to find a satisfactory solution that is stable, fair and optimal to all agents. According to traditional game theory, Prisoner’s dilemma, no or more than one Nash equilibrium games are situations that are difficult to find such a satisfactory solution. In human society, it often involves a trusted third party in the negotiation process among agents to ensure the cooperation and commitment of agents. In this paper, we describe how the trusted third party can be involved in the negotiation of multi-agent coordination to deal with many difficult game situations. We introduce two communication actions into the traditional game-theoretical reasoning: asking guarantee and offering compensation for agents to use in negotiation. Asking guarantee from agents and depositing it at the trusted third party can ensure the agents to keep their commitments, while offering compensation can allow finding a fair and compromised solution for all agents. We show how the negotiation communication protocols can be proceeded using these two communication actions to reach a compromised and stable agreement in all different game situations.

16 citations

Book ChapterDOI
10 Dec 2018
TL;DR: This paper proposes a blockchain-based data hiding method which interact with the blockchain record, where the external chain is utilized as the controller for the privacy data into carrier video, and removes the need for a trusted third party, enabling autonomous control of privacy data.
Abstract: The protection of secret data based on data hiding technique provides the basic security services for digital video through network transmission. However, the video with secret data is stored with centralized storage, which is vulnerable from external centralized attacks, such as the loss and tampering of the digital video. The protection of copyright and privacy data for digital video is still open issues. In this paper, we propose a blockchain-based data hiding method for data protection in digital video. To improve the integrity certification of secret data and the video, we combined the blockchain and data hiding techniques by adding the hash value to the block with a traceable hash value record; to improve the protection level of privacy data such as copyright related to digital video, we designed a DCT-based data hiding scheme which interact with the blockchain record, where the external chain is utilized as the controller for the privacy data into carrier video. Similar to Bitcoin, This system removes the need for a trusted third party, enabling autonomous control of privacy data.

16 citations

Proceedings ArticleDOI
Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang1, Xuexian Hu, Wenfen Liu 
02 Nov 2018
TL;DR: An optimized randomized response algorithm for generating synthetic graph, which dose not depend on a trusted third party in charge of collecting data, and a generated graph model under local differential privacy (LDPGM), which maintains the properties of the original graph well and ensures high usability.
Abstract: With the rapid development of big data technology, the issue of preserving personal privacy has attracted more and more attention. It has been shown that protecting the published graph with the differential privacy can ensure not only the quantitative privacy, but also the data usability. In this paper, we first put forward an optimized randomized response algorithm for generating synthetic graph, which dose not depend on a trusted third party in charge of collecting data. Furthermore, based on multi-party computation clustering, we propose a generated graph model under local differential privacy (LDPGM). The experiment indicates that LDPGM can effectively control the density of the synthetic graph so that significantly reduce the error between the synthetic graph and the original graph. Therefore, it maintains the properties of the original graph well and ensures high usability.

16 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177