scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The blockchain is utilized to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties.
Abstract: Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.

117 citations

Journal ArticleDOI
TL;DR: Burk et al. as discussed by the authors translated Japanese translation of article published in the Harvard Journal of Law and Technology to Japanese. But they did not specify the translation of the article into Japanese.
Abstract: Author(s): Burk, Dan L; Cohen, Julie E | Abstract: Japanese translation of article published in the Harvard Journal of Law and Technology

114 citations

Book ChapterDOI
27 Feb 2006
TL;DR: In this paper, the authors consider the problem of constructing secure auctions based on techniques from modern cryptography and combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems.
Abstract: In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography We combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems

114 citations

Journal ArticleDOI
TL;DR: Modifications are presented and analyze modifications to the protocols that avoid these problems and the basic challenges involved in formal analysis of fair exchange protocols are discussed.

112 citations

Book ChapterDOI
Christian Cachin1, Jan Camenisch1
20 Aug 2000
TL;DR: In this paper, the authors present an efficient and fair protocol for secure two-party computation in the optimistic model, where a partially trusted third party T is available, but not involved in normal protocol executions.
Abstract: We present an efficient and fair protocol for secure two-party computation in the optimistic model, where a partially trusted third party T is available, but not involved in normal protocol executions. T is needed only if communication is disrupted or if one of the two parties misbehaves. The protocol guarantees that although one party may terminate the protocol at any time, the computation remains fair for the other party. Communication is over an asynchronous network. All our protocols are based on efficient proofs of knowledge and involve no general zero-knowledge tools. As intermediate steps we describe efficient verifiable oblivious transfer and verifiable secure function evaluation protocols, whose security is proved under the decisional Diffie-Hellman assumption.

112 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177