Topic
Trusted third party
About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The blockchain is utilized to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties.
Abstract: Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.
117 citations
••
TL;DR: Burk et al. as discussed by the authors translated Japanese translation of article published in the Harvard Journal of Law and Technology to Japanese. But they did not specify the translation of the article into Japanese.
Abstract: Author(s): Burk, Dan L; Cohen, Julie E | Abstract: Japanese translation of article published in the Harvard Journal of Law and Technology
114 citations
••
27 Feb 2006TL;DR: In this paper, the authors consider the problem of constructing secure auctions based on techniques from modern cryptography and combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems.
Abstract: In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography We combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems
114 citations
••
TL;DR: Modifications are presented and analyze modifications to the protocols that avoid these problems and the basic challenges involved in formal analysis of fair exchange protocols are discussed.
112 citations
••
IBM1
TL;DR: In this paper, the authors present an efficient and fair protocol for secure two-party computation in the optimistic model, where a partially trusted third party T is available, but not involved in normal protocol executions.
Abstract: We present an efficient and fair protocol for secure two-party computation in the optimistic model, where a partially trusted third party T is available, but not involved in normal protocol executions. T is needed only if communication is disrupted or if one of the two parties misbehaves. The protocol guarantees that although one party may terminate the protocol at any time, the computation remains fair for the other party. Communication is over an asynchronous network. All our protocols are based on efficient proofs of knowledge and involve no general zero-knowledge tools. As intermediate steps we describe efficient verifiable oblivious transfer and verifiable secure function evaluation protocols, whose security is proved under the decisional Diffie-Hellman assumption.
112 citations