A Secured MultiParty Computational Protocol to Protect Cyber Space
In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of inform...
Uložené v:
| Vydané v: | Information security journal. Ročník 19; číslo 4; s. 175 - 181 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Taylor & Francis Group
11.08.2010
|
| Predmet: | |
| ISSN: | 1939-3555, 1939-3547 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also get hacked. In order to protect and secure the private data, the protocols of SMC need to be deployed in the large computer networks on which the organizations work. The protocols work at the micro-level in terms of cryptography with which the data are encrypted and then shared, while allowing the keys to be used for sharable data while also keeping the keys untouched for private data. At the macro level, multilevel architectures are used for different types of security to be achieved. The computation part of the secured multiparty computation is based on the algorithmic complexity theory. The algorithms realize the protocols in such a way that it is tedious to break (decrypt) the keys to hack the private data. |
|---|---|
| AbstractList | In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also get hacked. In order to protect and secure the private data, the protocols of SMC need to be deployed in the large computer networks on which the organizations work. The protocols work at the micro-level in terms of cryptography with which the data are encrypted and then shared, while allowing the keys to be used for sharable data while also keeping the keys untouched for private data. At the macro level, multilevel architectures are used for different types of security to be achieved. The computation part of the secured multiparty computation is based on the algorithmic complexity theory. The algorithms realize the protocols in such a way that it is tedious to break (decrypt) the keys to hack the private data. |
| Author | Chandwani, Manohar Mishra, Durgesh Kumar |
| Author_xml | – sequence: 1 givenname: Durgesh Kumar surname: Mishra fullname: Mishra, Durgesh Kumar email: mishra_research@rediffmail.com organization: Acropolis Institute of Technology and Research – sequence: 2 givenname: Manohar surname: Chandwani fullname: Chandwani, Manohar organization: Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya |
| BookMark | eNqFkEtLAzEUhYNUsFZ_gLvZuRrNczIBN7X4goqF6jpkkgyMZCZjkkHn39tacVOkq3u4nO_ewzkFk853FoALBK8QLOE1EkQQxqCAhBHMGDkC0-0uJ4zyyZ9m7AScxvgOYYGRgFNwO8_WVg_Bmux5cKlZqZDGbOHbfkgqNb5TLlsFn7z2Lkv-R1udssVY2ZCte6XtGTiulYv2_HfOwNv93eviMV--PDwt5stckwKnnDIlBKOGal4SU9XbpJwqgYghtIJVySpua8SNYarkRiteCGwKVVpWY2wJmYHL3d0--I_BxiTbJmrrnOqsH6IUEBW0xAwedJaiwJBgTDdOtHPq4GMMtpZ9aFoVRomg3BYr94rdMHzHNF3tQ6s-fXBGJjU6H-qgOt3EfUqmr7Qhbw6S5P_H35etkQo |
| Cites_doi | 10.1109/SECON.2007.342846 10.1109/TENCON.2007.4429049 10.1145/28395.28420 10.1109/ICDCS.Workshops.2008.130 10.1109/ICCCN.2002.1043083 10.1109/HICSS.2003.1174464 10.1109/ACSAC.2008.53 |
| ContentType | Journal Article |
| Copyright | Copyright Taylor & Francis Group, LLC 2010 |
| Copyright_xml | – notice: Copyright Taylor & Francis Group, LLC 2010 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1080/19393550903532553 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1939-3547 |
| EndPage | 181 |
| ExternalDocumentID | 10_1080_19393550903532553 453719 |
| GroupedDBID | .4S .7F .DC .QJ 0BK 0R~ 30N 5VS 6KP 8VB AAENE AAGDL AAHIA AAJMT AALDU AAMIU AAPUL AAQRR ABCCY ABDBF ABFIM ABLIJ ABPAQ ABPEM ABTAI ABXUL ABXYU ACGFS ACTIO ACUHS ADCVX ADGTB ADMLS ADUMR AEISY AEMOZ AEOZL AFRVT AGBKS AGDLA AGMYJ AHDZW AHQJS AIJEM AIYEW AKBVH AKOOK AKVCP ALMA_UNASSIGNED_HOLDINGS ALQZU AQRUH AQTUD ARCSS AVBZW AWYRJ BLEHA CAG CCCUG CE4 COF DGEBU DKSSO EAP EAS EBE EBO EBR EBS EBU ECR ECS EDO EHB EHE EIS EJD EMI EMK EPL EST ESX E~A E~B FIL FPAXQ GTTXZ H13 HF~ H~P IRD ITF ITG ITH J.P K1G K60 K6~ KYCEM M4Z NA5 NX~ PQBIZ QF4 QM6 QN7 QO4 QWB RNANH ROSJB RTWRZ S-T SNACF TASJS TBQAZ TDBHL TEN TFL TFT TFW TH9 TNC TTHFI TUROJ TUS TWF UT5 UU3 ZGOLN ZL0 ~S~ AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c362t-45a9954d4c783dbf903574a913d34b0b85b7ef17dd5a87dca7692d6a8e5f22e33 |
| IEDL.DBID | TFW |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000214819500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1939-3555 |
| IngestDate | Wed Oct 01 14:19:47 EDT 2025 Thu Sep 04 19:56:42 EDT 2025 Sat Nov 29 08:18:31 EST 2025 Mon Oct 20 23:47:53 EDT 2025 Mon May 13 12:10:19 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c362t-45a9954d4c783dbf903574a913d34b0b85b7ef17dd5a87dca7692d6a8e5f22e33 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 896203224 |
| PQPubID | 23500 |
| PageCount | 7 |
| ParticipantIDs | proquest_miscellaneous_901648250 proquest_miscellaneous_896203224 informaworld_taylorfrancis_310_1080_19393550903532553 crossref_primary_10_1080_19393550903532553 |
| PublicationCentury | 2000 |
| PublicationDate | 8/11/2010 |
| PublicationDateYYYYMMDD | 2010-08-11 |
| PublicationDate_xml | – month: 08 year: 2010 text: 8/11/2010 day: 11 |
| PublicationDecade | 2010 |
| PublicationTitle | Information security journal. |
| PublicationYear | 2010 |
| Publisher | Taylor & Francis Group |
| Publisher_xml | – name: Taylor & Francis Group |
| References | CIT0010 CIT0012 Brecher M. (CIT0008) 2000 Clifton C. (CIT0001) 2002; 4 Mishra D.K. (CIT0011) 2007; 2 CIT0003 CIT0014 CIT0002 CIT0013 CIT0005 CIT0004 CIT0007 CIT0006 CIT0009 |
| References_xml | – ident: CIT0009 doi: 10.1109/SECON.2007.342846 – ident: CIT0010 doi: 10.1109/SECON.2007.342846 – ident: CIT0012 doi: 10.1109/TENCON.2007.4429049 – ident: CIT0014 – volume: 4 start-page: 1 year: 2002 ident: CIT0001 publication-title: Proceeding of SIGKDD 2002: International Conference on Knowledge Discovery and Data Mining – volume: 2 start-page: 227 year: 2007 ident: CIT0011 publication-title: WSEAS Transactions on Computer Research – ident: CIT0005 doi: 10.1145/28395.28420 – ident: CIT0003 doi: 10.1109/ICDCS.Workshops.2008.130 – ident: CIT0004 doi: 10.1109/ICCCN.2002.1043083 – ident: CIT0006 doi: 10.1109/HICSS.2003.1174464 – ident: CIT0002 – ident: CIT0007 – volume-title: A study of crisis year: 2000 ident: CIT0008 – ident: CIT0013 doi: 10.1109/ACSAC.2008.53 |
| SSID | ssj0062190 |
| Score | 1.7533442 |
| Snippet | In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a... |
| SourceID | proquest crossref informaworld |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 175 |
| SubjectTerms | Algorithms Computation Computer information security correctness Cryptography cyberspace Keys Multilevel Organizations privacy secure multiparty computation (SMC) security Sheet molding compounds trusted third party (TTP) |
| Title | A Secured MultiParty Computational Protocol to Protect Cyber Space |
| URI | https://www.tandfonline.com/doi/abs/10.1080/19393550903532553 https://www.proquest.com/docview/896203224 https://www.proquest.com/docview/901648250 |
| Volume | 19 |
| WOSCitedRecordID | wos000214819500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAWR databaseName: Taylor & Francis customDbUrl: eissn: 1939-3547 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0062190 issn: 1939-3555 databaseCode: TFW dateStart: 20080324 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV05T8MwFLZQxcBCOUW55IEJKSJOfI6lomJAVYcC3SI7tiWWBDUuov8eO4dEVegAW4YX27Lf7efvAXCjfMxgSMIjrr37hrUVkZDai7s0EkuWo6YXwcsTm0z4fC6mbW1O1ZZVhhjaNkARta4Owi1V1VXE3XmfI6CChwwDSb1LHLA-vdkPYjkbv3Z6mHpZjJs7ZRF5ctLdaf40wppVWsMs3dDRteEZ9_-55AOw33qccNiwyCHYMcUR6HfdHGAr3Mfgfgjr5LvRsH6VO_VMtYINXZsxhNNF6UrPOtCV9bfXlnC0UmEYH3ubE_A8fpiNHqO2w0KUe8PlIkxkwIPTOGc81cqG5TEsBUp1ilWsOFHMWMS0JpIznUtGRaKp5IbYJDFpegp6RVmYMwCtIYbSPNY2ybHChCvEY2spUolGhtoBuO12OHtvgDQy1OKTbuzOAMTfzyBzdfbCNq1GNskz9-kGgGz5Jd0yFezON_OSFa5LZGHKZZVxQUN7-QT_TiICQJmPsePzP85-AfaacgQfyqNL0HOLpbkCu_mHe6sW1zU_fwHFZ_Ju |
| linkProvider | Taylor & Francis |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV05T8MwFH6CggQL5RTl9MCEFJHDV8ZSURVRqg7l2CI7tiWWBrUpov8eO4dEVegAW4YX27Lf_ezvAVxJGzNoEnKPK-u-YWViLxbKirvQAguWBmUvguc-Gwz462s8rBJu0-papYuhTQkUUehqJ9wuGV1fibuxToeDBXcpBhJZnzhahw1i7azDzh91X2pNTK00-mVVOfYsPamrmj8NsWCXFlBLl7R0YXq6zf8uehd2KqcTtUsu2YM1Pd6HZt3QAVXyfQC3bVTk37VCxcPcoeWrOSrpqqQhGk6yPLPcg_Ks-LYKE3Xm0g1jw299CE_du1Gn51VNFrzU2q7cw0Q4SDiFU8YjJY1bHsMiDiIVYelLTiTTJmBKEcGZSgWjcaio4JqYMNRRdASNcTbWx4CMJprS1FcmTLHEhMuA-8bQQIYq0NS04Lre4uS9xNJIggqidGl3WuB_P4QkLxIYpuw2skye5J95C8iKX6IVU6H6gBMrXK5iIsY6m00THlPXYT7Ev5PEDqPMhtn-yR9nv4St3uixn_TvBw-nsF3eTrCRfXAGjXwy0-ewmX7kb9PJRcHcXyGX9pg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BQYiF8hTl6YEJKSIP23HGUohAVFWHAt0iO7YllqRqU0T_PXYeElWBAbYMF9uy78738ncAV8L4DIr4zGHSmG9Y6siJuDTizhXHPEy9qhfBSz8cDNh4HA3r2pxZXVZpfWhdAUWUutoK90TqpiLuxtgcFhXcRhhIYEziYB02jNlMLYOP4tdGEVMjjG6VVI4cQ0-apOZ3QyxdS0ugpStKurx54vY_17wLO7XJiboVj-zBmsr2od20c0C1dB_AbReV0XclUfksd2i4aoEqujpkiIbTvMgN76AiL7-NukS9hbDDGOdbHcJzfD_qPTh1iwUnNTdX4WDCLSCcxGnIAim0XV6IeeQFMsDCFYyIUGkvlJJwFsqUhzTyJeVMEe37KgiOoJXlmToGpBVRlKau1H6KBSZMeMzVmnrCl56iugPXzQ4nkwpJI_FqgNKV3emA-_UMkqIMX-iq18gqeVJ8FB0gv_wS_DIVas43MaJl8yU8U_l8lrCI2v7yPv6ZJLIIZcbJdk_-OPslbA3v4qT_OHg6he2qNMG49d4ZtIrpXJ3DZvpevM2mFyVrfwJBCfVK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Secured+MultiParty+Computational+Protocol+to+Protect+Cyber+Space&rft.jtitle=Information+security+journal.&rft.au=Mishra%2C+Durgesh+Kumar&rft.au=Chandwani%2C+Manohar&rft.date=2010-08-11&rft.issn=1939-3555&rft.eissn=1939-3547&rft_id=info:doi/10.1080%2F19393550903532553&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-3555&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-3555&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-3555&client=summon |