scholarly journals Rate-limited secure function evaluation

2016 ◽  
Vol 653 ◽  
pp. 53-78
Author(s):  
Özgür Dagdelen ◽  
Payman Mohassel ◽  
Daniele Venturi
2021 ◽  
pp. 0-0
Author(s):  
Siam U. Hussain ◽  
M. Sadegh Riazi ◽  
Farinaz Koushanfar

Author(s):  
Rashid Sheikh ◽  
◽  
Rashid Sheikh ◽  
Durgesh Kumar Mishra ◽  
Meghna Dubey ◽  
...  

The ideal Secure Multiparty Computation (SMC) model deploys a Trusted Third Party (TTP) which assists in secure function evaluation. The participating joint parties give input to the TTP which provide the results to the participating parties. The equality check problem in multiple party cases can be solved by simple architecture and a simple algorithm. In our proposed protocol Equality Hash Checkin ideal model, we use a secure hash function. All the parties interested to check equality of their data supply hash of their data to the TTP which then compared all hash values for equality. It declares the result to the parties.


Sign in / Sign up

Export Citation Format

Share Document