scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2011
TL;DR: This paper proposes a fake location reporting solution that does not require any additional trusted third party deployment and demonstrates a new type of attack, where an adversary can combine the location and friendship information found in a MSN to violate user privacy.
Abstract: Privacy is an important concern for location based services (LBSs). In this paper, we consider a specific type of LBS known as a mobile social network (MSN). We demonstrate a new type of attack, where an adversary can combine the location and friendship information found in a MSN, to violate user privacy. We propose a fake location reporting solution that does not require any additional trusted third party deployment. We use extensive simulations to determine the validity of our scheme.

16 citations

Proceedings ArticleDOI
01 Jul 2018
TL;DR: Chained of Things Framework is introduced and a blockchain-based secure ride-sharing service between passengers and autonomous vehicles is developed and initial results based on a proposed protocol are provided.
Abstract: Car manufacturers are investing heavily in Autonomous Vehicles (AVs) because of their increasing popularity. AVs employ a combination of high-tech sensors and innovative algorithms to detect and respond to their surroundings, including radar, laser light, GPS, odometer, drive-by-wire control systems, and computer vision. When a user requests for a ride share or rent, the responding AV/IoT device does not have the sufficient capability to store, process, or verify each other. Currently, every AV/IoT device typically needs to rely on a trusted third party, which invokes another trust issue. If the trusted third party is rogue or loses credibility, the whole system will collapse. This paper introduces Chained of Things Framework and develops a blockchain-based secure ride-sharing service between passengers and autonomous vehicles. We implement an initial prototype and provide our initial results based on a proposed protocol.

16 citations

Journal ArticleDOI
TL;DR: The paper indicates the system built in a decentralized computing system to assure trusted third party for conducting computation over patient data without violating the privacy and reduces latency, execution time, and throughput compared than existing approaches.
Abstract: In recent years, the block chain technology considered as adaptable compared to other techniques. Many of the industry, understanding the block chain technology is utilizing for financial services and its transactions but it also effective in other sectors like healthcare industry. Existing methods are hazardous; where, data stored in outsider servers might be eavesdropped, stolen, or legitimate way. Nevertheless, the trustworthiness of storage server architecture relies upon dependability of single service provider. The security manager’s detect the which are client(s) can get to a specific part of the data. However, the existing method is increasingly failed to maintain access control, record transaction authentications with anonymous interruptions. The paper proposes a secure and efficient health record transaction utilizing block chain (SEHRTB) algorithm for addressing health record information transaction between the patient, doctor, service providers, and institutions in a privacy-preserving way. The work provides a healthcare sector with block chain technology. In health care, the work enables the patient to control and share their health record into cloud storage easily in a secured manner without any violation of privacy. It provides an effective way to ensure the patient data privately in intelligent health care systems. The paper indicates the system built in a decentralized computing system to assure trusted third party for conducting computation over patient data without violating the privacy. Based on Experimental result, the SEHRTB algorithm reduces 2.05 latency, 1.08 ET (execution time), and improves 30.5% throughput compared than existing approaches.

16 citations

Journal ArticleDOI
TL;DR: This work proposes a new e-lottery scheme that can satisfy all the identified requirements without the presence of TTP for generating the winning numbers, yet the result of this generation is publicly verifiable.

16 citations

Journal ArticleDOI
TL;DR: This paper proposes a framework that utilizes blockchain and key escrow encryption system in a bid to optimize the security of supply chains for long-lifecycle systems and provide better measures to improve services for global business survivability.
Abstract: The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by the penetration of counterfeit components (parts) during the operation and maintenance phase Such security issues are concatenated with data related to supply chain, accordingly, system parts need to fulfill the traceability on a fundamental basis In addition to traceability, supply chains should also meet the data security standards of availability, integrity and confidentiality in the long run Also, even without trusted third party, these data should be available to users In this paper, we, therefore, propose a framework that utilizes blockchain and key escrow encryption system in a bid to optimize the security of supply chains for long-lifecycle systems and provide better measures to improve services for global business survivability

16 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177