scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Proceedings ArticleDOI
07 Apr 2013
TL;DR: A novel scheme, called 3PLUS, which can significantly improve users' location privacy without reliance on the Trusted Third Party (TTP), and is simple to implement, and does not require changing the current structure of LBSs server.
Abstract: Location-Based Services (LBSs) are becoming increasingly popular with rapid developments of social networks and location aware devices, such as smartphones and tablets Users query the LBSs server and get service information about their surroundings Unfortunately, these queries may lead to serious security and privacy concerns It is very hard for users to access LBSs while keeping their privacy at the same time To deal with this problem, we propose a novel scheme, called 3PLUS It can significantly improve users' location privacy without reliance on the Trusted Third Party (TTP) Further more, it is simple to implement, and does not require changing the current structure of LBSs server Users use a buffer to record the pseudo-locations, which come from both the history locations of herself and the encountered users When two users encounter, by using their pseudonyms, they randomly choose a pseudo-location from their buffers and exchange with each other Then she can find and submit k valid locations together to un-trusted LBSs server easily when the service is needed Our evaluation results indicate us a hidden relationship between k, the buffer size S and exchanging number N

34 citations

Proceedings ArticleDOI
02 Jul 2013
TL;DR: This paper designs the secure cloud computing (SCC), using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based secret sharing, and two types of SCC are proposed which require a trusted third party (TTP) and do not need a TTP.
Abstract: Cloud computing is an Internet-based computing. Computing services, such as data, storage, software, computing, and application, are delivered to local devices through Internet. The major security issue of cloud computing is that the cloud provider must ensure that their infrastructure is secure, and that prevent illegal data accesses from outsiders, other clients, or even the unauthorized cloud employees. In this paper, we deal with cloud security services including key agreement and authentication. By using Elliptic Curve Diffie-Hellman (ECDH) and symmetric bivariate polynomial based secret sharing, we design the secure cloud computing (SCC). Two types of SCC are proposed. One requires a trusted third party (TTP), and the other does not need a TTP. Also, our SCC can be extended to multi-server SCC (MSCC) to fit an environment, where each multi-server system contains multiple servers to collaborate for serving applications. Due to the strong security and operation efficiency, the proposed SCC and MSCC are extremely suitable for use in cloud computing.

34 citations

Proceedings ArticleDOI
11 Mar 2002
TL;DR: A method to adapt an existing technique, execution tracing, to enhance its flexibility in deployment for a large scale mobile agent system through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the platform launching the agent.
Abstract: The problem of protecting mobile code from malicious hosts is an important security issue, for which many solutions have been proposed. We describe a method to adapt an existing technique, execution tracing, to enhance its flexibility in deployment for a large scale mobile agent system. This is achieved through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the platform launching the agent. The server constructs a certificate that testifies to the capability of a particular host platform to undertake the correct execution of a mobile agent. In this sense, the server assumes a role analogous of a Certificate Authority (CA) in a PKI. We briefly discuss the issues associated with such a framework.

34 citations

Journal ArticleDOI
TL;DR: The proposed protocol does not require a conventional TTP, and it does not present the disadvantages of solutions without a TTP (computational and/or communication cost), and it satisfies the necessary security requirements: fairness, timeliness and non-repudiation.

34 citations

Journal ArticleDOI
TL;DR: This work introduces the notion of digital seals and provides a mechanism for transferring the trust placed by users in companies in the physical world, to the electronic one.
Abstract: Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or products. The Web currently constitutes an enabler for electronic commerce, providing a global transaction platform that does not require physical presence. However, transferring trust from the physical world to the electronic one is a process that requires a trust infrastructure. The current infrastructure, based on trusted third parties can be enhanced. We introduce the notion of digital seals and provide a mechanism for transferring the trust placed by users in companies in the physical world, to the electronic one.

34 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177