scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Book ChapterDOI
03 Apr 2017
TL;DR: This work has devised the first privacy-preserving protocol for automatically determining an actual trade between multiple parties without involving a trusted third party.
Abstract: Both B2B bartering as well as bartering between individuals is increasingly facilitated through online platforms. However, typically these platforms lack automation and tend to neglect the privacy of their users by leaking crucial information about trades. It is in this context that we devise the first privacy-preserving protocol for automatically determining an actual trade between multiple parties without involving a trusted third party.

12 citations

Journal ArticleDOI
TL;DR: This work introduces the notion of function substitution, which replaces the computation of a function that reveals sensitive information with that of an approximate function, and experiments show that this enhances the confidentiality of the inputs while controlling the distortion of computed output values.
Abstract: The purpose of secure multi-party computation is to enable protocol participants to compute a public function of their private inputs while keeping their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalizing both Renyi entropy and $g$ -entropy so as to quantify this information leakage. In order to control and restrain such information flows, we introduce the notion of function substitution, which replaces the computation of a function that reveals sensitive information with that of an approximate function. We exhibit theoretical bounds for the privacy gains that this approach provides and experimentally show that this enhances the confidentiality of the inputs while controlling the distortion of computed output values. Finally, we investigate the inherent compromise between accuracy of computation and privacy of inputs and we demonstrate how to realize such optimal trade-offs.

12 citations

Book ChapterDOI
16 Oct 2011
TL;DR: This paper gives out the detailed EVES protocol and securely obfuscates it, and proves the security requirement of virtual black box property under standard assumptions and the secure obfuscation result will have many practical applications as it issue.
Abstract: Since obfuscation was brought into the field of cryptography, it has become one of the most difficult and hottest problems Because a general secure obfuscating method, if exists, will lead to the solution of many open problems in cryptography However, after Bark et al's negative impossibility result for general obfuscation became well-known, only a few positive results was brought out In EUROCRYPT 2010, Hada proposed a secure obfuscator of encrypted signatures (ES), which signs a message under Alice's secret signing key and then encrypts the signature using Bob's public encryption key This result is the only few secure obfuscation of complicated cryptographic primitives In this paper, we consider the obfuscation of encrypted verifiable encrypted signatures (EVES) There is a trusted third party (TTP) in our protocol, and EVES first generates a verifiable encrypted signature (VES) under Alice's secret signing key and the TTP's public encryption key and then the VES is encrypted using Bob's public encryption key We give out the detailed EVES protocol and securely obfuscate it We prove the security requirement of virtual black box property under standard assumptions and the secure obfuscation result will have many practical applications as we issue

12 citations

Patent
30 Jun 2011
TL;DR: In this paper, the authors describe a system for a site to facilitate privacy-preserving interactions between users of a site and a third party utility, such as a third-party service provider.
Abstract: Various embodiments are directed to computer-implemented methods and systems for a site to facilitate privacy protected interactions between users of a site and a third party utility. For example, a computer may receiving from a user selected from the users of the site, a request to interact with the third party utility. The computer may also encrypt an identification of the user to generate an encrypted user identification associated with the third party utility; and provide the encrypted user identification and the request to the third party utility.

12 citations

Journal ArticleDOI
TL;DR: The improved K-value location privacy protection method according to privacy level is proposed, which combines k-anonymity method with pseudonym method, and the results show that this improved method can anonymize all service requests effectively.
Abstract: With the development of Augmented Reality technology, the application of location based service (LBS) is more and more popular, which provides enormous convenience to people’s life. User location information could be obtained at anytime and anywhere. So user location privacy security suffers huge threats. Therefore, it is crucial to pay attention to location privacy protection in LBS. Based on the architecture of the trusted third party (TTP), we analyzed the advantages and shortages of existing location privacy protection methods in LBS on mobile terminal. Then we proposed the improved K-value location privacy protection method according to privacy level, which combines k-anonymity method with pseudonym method. Through the simulation experiment, the results show that this improved method can anonymize all service requests effectively. In addition to the experiment of execution time, it demonstrated that our proposed method can realize the location privacy protection more efficiently.

12 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177