scholarly journals A Protocol for Checking Equality of Data Using Hash in Ideal Model of Secure Multiparty Computation

Author(s):  
Rashid Sheikh ◽  
◽  
Rashid Sheikh ◽  
Durgesh Kumar Mishra ◽  
Meghna Dubey ◽  
...  

The ideal Secure Multiparty Computation (SMC) model deploys a Trusted Third Party (TTP) which assists in secure function evaluation. The participating joint parties give input to the TTP which provide the results to the participating parties. The equality check problem in multiple party cases can be solved by simple architecture and a simple algorithm. In our proposed protocol Equality Hash Checkin ideal model, we use a secure hash function. All the parties interested to check equality of their data supply hash of their data to the TTP which then compared all hash values for equality. It declares the result to the parties.

2021 ◽  
Author(s):  
Anatoly Anisimov ◽  
Andrey Novokshonov

We describe a fast three-round mutual authentication protocol for parties A and B belonging to the same coalition group. Parties A and B keep their own independent long-term private keys that are used in the process of authentication and can be used for other purposes. The scheme assumes an initial setup with a trusted third party T. This party initiates another secret information that includes factors of a large RSA modulus. For authentication, both parties must demonstrate each other the knowledge of their private keys without revealing them and the ability to factorize a large RSA modulus. Thus, the protocol based on the suggested scheme provides reciprocal authentication. The scheme possesses all desirable properties of an interactive proof, i.e., completeness, soundness, and zero-knowledge. The security of the protocol relies on assumptions of difficulty of the RSA factorization and existence of a cryptographic hash function.


2021 ◽  
Author(s):  
Anatoly Anisimov ◽  
Andrey Novokshonov

We describe a fast three-round mutual authentication protocol for parties A and B belonging to the same coalition group. Parties A and B keep their own independent long-term private keys that are used in the process of authentication and can be used for other purposes. The scheme assumes an initial setup with a trusted third party T. This party initiates another secret information that includes factors of a large RSA modulus. For authentication, both parties must demonstrate each other the knowledge of their private keys without revealing them and the ability to factorize a large RSA modulus. Thus, the protocol based on the suggested scheme provides reciprocal authentication. The scheme possesses all desirable properties of an interactive proof, i.e., completeness, soundness, and zero-knowledge. The security of the protocol relies on assumptions of difficulty of the RSA factorization and existence of a cryptographic hash function.


2013 ◽  
Vol 33 (12) ◽  
pp. 3527-3530
Author(s):  
Yongli DOU ◽  
Haichun WANG ◽  
Jian KANG

Author(s):  
T. M. Rudavsky

Chapter 9 is concerned with social and political behavior. Even in the context of moral philosophy, Jewish philosophers discuss issues within the wider context of a rational scientific perspective. This chapter begins with specific moral codes developed by Jewish thinkers, focusing in particular upon the works of Ibn Gabirol, Baḥya ibn Paquda, Maimonides, and Crescas. Can there be ethical dictates independent of the commandments? The rabbis already worried whether there existed a domain of “right behavior” that pre-dates, or exists independently of, divine commandment. Does Aristotle’s doctrine of the mean apply to divine law? Furthermore, can all humans achieve intellectual perfection? Is the road the same, and open, to all? And is there only one road to ultimate felicity, or are there many routes? The chapter ends with a discussion of whether human felicity can be achieved in this life, and whether the prophet best represents the ideal model for such achievement.


2012 ◽  
Vol 1 (2) ◽  
pp. 26 ◽  
Author(s):  
Claudia A. Zanini ◽  
Sara Rubinelli

This paper aims to identify the challenges in the implementation of shared decision-making (SDM) when the doctor and the patient have a difference of opinion. It analyses the preconditions of the resolution of this difference of opinion by using an analytical and normative framework known in the field of argumentation theory as the ideal model of critical discussion. This analysis highlights the communication skills and attitudes that both doctors and patients must apply in a dispute resolution-oriented communication. Questions arise over the methods of empowerment of doctors and patients in these skills and attitudes as the preconditions of SDM. Overall, the paper highlights aspects in which research is needed to design appropriate programmes of training, education and support in order to equip doctors and patients with the means to successfully engage in shared decision-making.


2021 ◽  
pp. 0-0
Author(s):  
Siam U. Hussain ◽  
M. Sadegh Riazi ◽  
Farinaz Koushanfar

2006 ◽  
Vol 78 (22) ◽  
pp. 7828-7840 ◽  
Author(s):  
Weiqiang Hao ◽  
Xiangmin Zhang ◽  
Keyong Hou

2013 ◽  
Vol 2013 ◽  
pp. 1-5 ◽  
Author(s):  
Yi Sun ◽  
Qiaoyan Wen ◽  
Yudong Zhang ◽  
Hua Zhang ◽  
Zhengping Jin

As a powerful tool in solving privacy preserving cooperative problems, secure multiparty computation is more and more popular in electronic bidding, anonymous voting, and online auction. Privacy preserving sequencing problem which is an essential link is regarded as the core issue in these applications. However, due to the difficulties of solving multiparty privacy preserving sequencing problem, related secure protocol is extremely rare. In order to break this deadlock, this paper first presents an efficient secure multiparty computation protocol for the general privacy-preserving sequencing problem based on symmetric homomorphic encryption. The result is of value not only in theory, but also in practice.


Sign in / Sign up

Export Citation Format

Share Document