A Secured MultiParty Computational Protocol to Protect Cyber Space

In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of inform...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Information security journal. Ročník 19; číslo 4; s. 175 - 181
Hlavní autori: Mishra, Durgesh Kumar, Chandwani, Manohar
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Taylor & Francis Group 11.08.2010
Predmet:
ISSN:1939-3555, 1939-3547
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also get hacked. In order to protect and secure the private data, the protocols of SMC need to be deployed in the large computer networks on which the organizations work. The protocols work at the micro-level in terms of cryptography with which the data are encrypted and then shared, while allowing the keys to be used for sharable data while also keeping the keys untouched for private data. At the macro level, multilevel architectures are used for different types of security to be achieved. The computation part of the secured multiparty computation is based on the algorithmic complexity theory. The algorithms realize the protocols in such a way that it is tedious to break (decrypt) the keys to hack the private data.
AbstractList In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also get hacked. In order to protect and secure the private data, the protocols of SMC need to be deployed in the large computer networks on which the organizations work. The protocols work at the micro-level in terms of cryptography with which the data are encrypted and then shared, while allowing the keys to be used for sharable data while also keeping the keys untouched for private data. At the macro level, multilevel architectures are used for different types of security to be achieved. The computation part of the secured multiparty computation is based on the algorithmic complexity theory. The algorithms realize the protocols in such a way that it is tedious to break (decrypt) the keys to hack the private data.
Author Chandwani, Manohar
Mishra, Durgesh Kumar
Author_xml – sequence: 1
  givenname: Durgesh Kumar
  surname: Mishra
  fullname: Mishra, Durgesh Kumar
  email: mishra_research@rediffmail.com
  organization: Acropolis Institute of Technology and Research
– sequence: 2
  givenname: Manohar
  surname: Chandwani
  fullname: Chandwani, Manohar
  organization: Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya
BookMark eNqFkEtLAzEUhYNUsFZ_gLvZuRrNczIBN7X4goqF6jpkkgyMZCZjkkHn39tacVOkq3u4nO_ewzkFk853FoALBK8QLOE1EkQQxqCAhBHMGDkC0-0uJ4zyyZ9m7AScxvgOYYGRgFNwO8_WVg_Bmux5cKlZqZDGbOHbfkgqNb5TLlsFn7z2Lkv-R1udssVY2ZCte6XtGTiulYv2_HfOwNv93eviMV--PDwt5stckwKnnDIlBKOGal4SU9XbpJwqgYghtIJVySpua8SNYarkRiteCGwKVVpWY2wJmYHL3d0--I_BxiTbJmrrnOqsH6IUEBW0xAwedJaiwJBgTDdOtHPq4GMMtpZ9aFoVRomg3BYr94rdMHzHNF3tQ6s-fXBGJjU6H-qgOt3EfUqmr7Qhbw6S5P_H35etkQo
Cites_doi 10.1109/SECON.2007.342846
10.1109/TENCON.2007.4429049
10.1145/28395.28420
10.1109/ICDCS.Workshops.2008.130
10.1109/ICCCN.2002.1043083
10.1109/HICSS.2003.1174464
10.1109/ACSAC.2008.53
ContentType Journal Article
Copyright Copyright Taylor & Francis Group, LLC 2010
Copyright_xml – notice: Copyright Taylor & Francis Group, LLC 2010
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1080/19393550903532553
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1939-3547
EndPage 181
ExternalDocumentID 10_1080_19393550903532553
453719
GroupedDBID .4S
.7F
.DC
.QJ
0BK
0R~
30N
5VS
6KP
8VB
AAENE
AAGDL
AAHIA
AAJMT
AALDU
AAMIU
AAPUL
AAQRR
ABCCY
ABDBF
ABFIM
ABLIJ
ABPAQ
ABPEM
ABTAI
ABXUL
ABXYU
ACGFS
ACTIO
ACUHS
ADCVX
ADGTB
ADMLS
ADUMR
AEISY
AEMOZ
AEOZL
AFRVT
AGBKS
AGDLA
AGMYJ
AHDZW
AHQJS
AIJEM
AIYEW
AKBVH
AKOOK
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQRUH
AQTUD
ARCSS
AVBZW
AWYRJ
BLEHA
CAG
CCCUG
CE4
COF
DGEBU
DKSSO
EAP
EAS
EBE
EBO
EBR
EBS
EBU
ECR
ECS
EDO
EHB
EHE
EIS
EJD
EMI
EMK
EPL
EST
ESX
E~A
E~B
FIL
FPAXQ
GTTXZ
H13
HF~
H~P
IRD
ITF
ITG
ITH
J.P
K1G
K60
K6~
KYCEM
M4Z
NA5
NX~
PQBIZ
QF4
QM6
QN7
QO4
QWB
RNANH
ROSJB
RTWRZ
S-T
SNACF
TASJS
TBQAZ
TDBHL
TEN
TFL
TFT
TFW
TH9
TNC
TTHFI
TUROJ
TUS
TWF
UT5
UU3
ZGOLN
ZL0
~S~
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c362t-45a9954d4c783dbf903574a913d34b0b85b7ef17dd5a87dca7692d6a8e5f22e33
IEDL.DBID TFW
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000214819500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1939-3555
IngestDate Wed Oct 01 14:19:47 EDT 2025
Thu Sep 04 19:56:42 EDT 2025
Sat Nov 29 08:18:31 EST 2025
Mon Oct 20 23:47:53 EDT 2025
Mon May 13 12:10:19 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c362t-45a9954d4c783dbf903574a913d34b0b85b7ef17dd5a87dca7692d6a8e5f22e33
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 896203224
PQPubID 23500
PageCount 7
ParticipantIDs proquest_miscellaneous_901648250
proquest_miscellaneous_896203224
informaworld_taylorfrancis_310_1080_19393550903532553
crossref_primary_10_1080_19393550903532553
PublicationCentury 2000
PublicationDate 8/11/2010
PublicationDateYYYYMMDD 2010-08-11
PublicationDate_xml – month: 08
  year: 2010
  text: 8/11/2010
  day: 11
PublicationDecade 2010
PublicationTitle Information security journal.
PublicationYear 2010
Publisher Taylor & Francis Group
Publisher_xml – name: Taylor & Francis Group
References CIT0010
CIT0012
Brecher M. (CIT0008) 2000
Clifton C. (CIT0001) 2002; 4
Mishra D.K. (CIT0011) 2007; 2
CIT0003
CIT0014
CIT0002
CIT0013
CIT0005
CIT0004
CIT0007
CIT0006
CIT0009
References_xml – ident: CIT0009
  doi: 10.1109/SECON.2007.342846
– ident: CIT0010
  doi: 10.1109/SECON.2007.342846
– ident: CIT0012
  doi: 10.1109/TENCON.2007.4429049
– ident: CIT0014
– volume: 4
  start-page: 1
  year: 2002
  ident: CIT0001
  publication-title: Proceeding of SIGKDD 2002: International Conference on Knowledge Discovery and Data Mining
– volume: 2
  start-page: 227
  year: 2007
  ident: CIT0011
  publication-title: WSEAS Transactions on Computer Research
– ident: CIT0005
  doi: 10.1145/28395.28420
– ident: CIT0003
  doi: 10.1109/ICDCS.Workshops.2008.130
– ident: CIT0004
  doi: 10.1109/ICCCN.2002.1043083
– ident: CIT0006
  doi: 10.1109/HICSS.2003.1174464
– ident: CIT0002
– ident: CIT0007
– volume-title: A study of crisis
  year: 2000
  ident: CIT0008
– ident: CIT0013
  doi: 10.1109/ACSAC.2008.53
SSID ssj0062190
Score 1.7533442
Snippet In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 175
SubjectTerms Algorithms
Computation
Computer information security
correctness
Cryptography
cyberspace
Keys
Multilevel
Organizations
privacy
secure multiparty computation (SMC)
security
Sheet molding compounds
trusted third party (TTP)
Title A Secured MultiParty Computational Protocol to Protect Cyber Space
URI https://www.tandfonline.com/doi/abs/10.1080/19393550903532553
https://www.proquest.com/docview/896203224
https://www.proquest.com/docview/901648250
Volume 19
WOSCitedRecordID wos000214819500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAWR
  databaseName: Taylor & Francis
  customDbUrl:
  eissn: 1939-3547
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0062190
  issn: 1939-3555
  databaseCode: TFW
  dateStart: 20080324
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV05T8MwFLZQxcBCOUW55IEJKSJOfI6lomJAVYcC3SI7tiWWBDUuov8eO4dEVegAW4YX27Lf7efvAXCjfMxgSMIjrr37hrUVkZDai7s0EkuWo6YXwcsTm0z4fC6mbW1O1ZZVhhjaNkARta4Owi1V1VXE3XmfI6CChwwDSb1LHLA-vdkPYjkbv3Z6mHpZjJs7ZRF5ctLdaf40wppVWsMs3dDRteEZ9_-55AOw33qccNiwyCHYMcUR6HfdHGAr3Mfgfgjr5LvRsH6VO_VMtYINXZsxhNNF6UrPOtCV9bfXlnC0UmEYH3ubE_A8fpiNHqO2w0KUe8PlIkxkwIPTOGc81cqG5TEsBUp1ilWsOFHMWMS0JpIznUtGRaKp5IbYJDFpegp6RVmYMwCtIYbSPNY2ybHChCvEY2spUolGhtoBuO12OHtvgDQy1OKTbuzOAMTfzyBzdfbCNq1GNskz9-kGgGz5Jd0yFezON_OSFa5LZGHKZZVxQUN7-QT_TiICQJmPsePzP85-AfaacgQfyqNL0HOLpbkCu_mHe6sW1zU_fwHFZ_Ju
linkProvider Taylor & Francis
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV05T8MwFH6CggQL5RTl9MCEFJHDV8ZSURVRqg7l2CI7tiWWBrUpov8eO4dEVegAW4YX27Lf_ezvAVxJGzNoEnKPK-u-YWViLxbKirvQAguWBmUvguc-Gwz462s8rBJu0-papYuhTQkUUehqJ9wuGV1fibuxToeDBXcpBhJZnzhahw1i7azDzh91X2pNTK00-mVVOfYsPamrmj8NsWCXFlBLl7R0YXq6zf8uehd2KqcTtUsu2YM1Pd6HZt3QAVXyfQC3bVTk37VCxcPcoeWrOSrpqqQhGk6yPLPcg_Ks-LYKE3Xm0g1jw299CE_du1Gn51VNFrzU2q7cw0Q4SDiFU8YjJY1bHsMiDiIVYelLTiTTJmBKEcGZSgWjcaio4JqYMNRRdASNcTbWx4CMJprS1FcmTLHEhMuA-8bQQIYq0NS04Lre4uS9xNJIggqidGl3WuB_P4QkLxIYpuw2skye5J95C8iKX6IVU6H6gBMrXK5iIsY6m00THlPXYT7Ev5PEDqPMhtn-yR9nv4St3uixn_TvBw-nsF3eTrCRfXAGjXwy0-ewmX7kb9PJRcHcXyGX9pg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BQYiF8hTl6YEJKSIP23HGUohAVFWHAt0iO7YllqRqU0T_PXYeElWBAbYMF9uy78738ncAV8L4DIr4zGHSmG9Y6siJuDTizhXHPEy9qhfBSz8cDNh4HA3r2pxZXVZpfWhdAUWUutoK90TqpiLuxtgcFhXcRhhIYEziYB02jNlMLYOP4tdGEVMjjG6VVI4cQ0-apOZ3QyxdS0ugpStKurx54vY_17wLO7XJiboVj-zBmsr2od20c0C1dB_AbReV0XclUfksd2i4aoEqujpkiIbTvMgN76AiL7-NukS9hbDDGOdbHcJzfD_qPTh1iwUnNTdX4WDCLSCcxGnIAim0XV6IeeQFMsDCFYyIUGkvlJJwFsqUhzTyJeVMEe37KgiOoJXlmToGpBVRlKau1H6KBSZMeMzVmnrCl56iugPXzQ4nkwpJI_FqgNKV3emA-_UMkqIMX-iq18gqeVJ8FB0gv_wS_DIVas43MaJl8yU8U_l8lrCI2v7yPv6ZJLIIZcbJdk_-OPslbA3v4qT_OHg6he2qNMG49d4ZtIrpXJ3DZvpevM2mFyVrfwJBCfVK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Secured+MultiParty+Computational+Protocol+to+Protect+Cyber+Space&rft.jtitle=Information+security+journal.&rft.au=Mishra%2C+Durgesh+Kumar&rft.au=Chandwani%2C+Manohar&rft.date=2010-08-11&rft.issn=1939-3555&rft.eissn=1939-3547&rft_id=info:doi/10.1080%2F19393550903532553&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-3555&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-3555&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-3555&client=summon