scholarly journals Secure Multiparty Equality Check Based on Homomorphic Cryptosystem

There exist many scenarios where multiple parties jointly work on some common project but these parties are not interested to show actual value of data to each other. Here we propose an algorithm where multiple cooperating but distrustful parties can compare their data for equality without disclosing it to one another. This is an improvement over two party comparison algorithm devised earlier by other researchers. The proposed work is suitable for semi honest adversaries who respect rules of the protocol but somehow try to know private values with other parties.

2017 ◽  
Author(s):  
Luke Froeb ◽  
Vlad Mares ◽  
Steven Tschantz

2011 ◽  
Vol 73 (1) ◽  
pp. 52-64 ◽  
Author(s):  
Omer Biran ◽  
Françoise Forges

2004 ◽  
Vol 94 (5) ◽  
pp. 1452-1475 ◽  
Author(s):  
Lawrence M Ausubel

When bidders exhibit multi-unit demands, standard auction methods generally yield inefficient outcomes. This article proposes a new ascending-bid auction for homogeneous goods, such as Treasury bills or telecommunications spectrum. The auctioneer announces a price and bidders respond with quantities. Items are awarded at the current price whenever they are “clinched,” and the price is incremented until the market clears. With private values, this (dynamic) auction yields the same outcome as the (sealed-bid) Vickrey auction, but has advantages of simplicity and privacy preservation. With interdependent values, this auction may retain efficiency, whereas the Vickrey auction suffers from a generalized Winner's Curse.


Public Choice ◽  
2008 ◽  
Vol 138 (3-4) ◽  
pp. 409-422 ◽  
Author(s):  
Yong Sui
Keyword(s):  

Sensor Review ◽  
2018 ◽  
Vol 38 (3) ◽  
pp. 369-375 ◽  
Author(s):  
Sathya D. ◽  
Ganesh Kumar P.

PurposeThis study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.Design/methodology/approachNowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Bonehet al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.FindingsThe combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.Practical implicationsThe secured data aggregation is useful in health-related applications, military applications, etc.Originality/valueThe new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.


Sign in / Sign up

Export Citation Format

Share Document