International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 3, Issue 2, No 2, 2015.

Copyright: All Rights Reserved ©2015

Year of Publication: 2015

Author: S.Tamizharasi,K. Ravikumar


View PDF Format


Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the objective to create methods for parties to equally compute a function more their inputs, and maintenance these inputs private [1].In this paper, we survey the basic paradigms and notions of secure multiparty computation and talk about their significance to the field of privacypreserving data mining and cloud computing. In addition to reviewing definition and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing greatly efficient protocols. We also there common errors that are prevalent in the writing when secure multiparty computation techniques are useful to privacy-preserving data mining and cloud computing. Finally, we talk about the relationship among secure multiparty computation and privacy-preserving data mining and cloud computing.


[1]. /Secure Multiparty Computation.pdf [2]. Yehuda Lindell and Benny Pinkas,. “Secure Multiparty Computation for Privacy-Preserving Data Mining” The Journal of Privacy and Confidentiality (2009) 1, Number 1, pp. 59–98. [3]. Andrew C. Yao, Protocols for secure computations (extended abstract) [4]D.Chaum,C.CrepeauandI.Damgard.“Multipartyunconditionallysecureprotocols”. . [5]O.Goldreich,S.MicaliandA.Wigderson.“How to play any mental game or a completeness theorem for protocols with honest majority”. . [6] Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielse, Jakob Pagter, Michael Schwartzbach and Tomas Toft (2008). “Multiparty Computation Goes Live”. nrm me clr atc(Report2008/068). [7]. Vaibhav Kumar, R. P. Ojha, ” Mobile Proactive Secret Sharing in Cloud Computing” IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-2, September 2012 ,page no 67. [8]. Twin Clouds: An Architecture for Secure Cloud Computing(Extended Abstract), Sven Bugiel, Stefan Nu¨rnberger, Ahmad-Reza Sadeghi, Thomas Schneider [9]. Danish jamil et al. / international journal of engineering science and technology (ijest),”Security issues in cloud computing and countermeasures” [10]. Secure Outsourced Computation in a Multi-tenant Cloud, Seny Kamara Microsoft Research,Mariana Raykova Columbia University [11]. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing,Marten van Dijk RSA Laboratories,Ari Juels RSA [12]. [13] [14.]


Secure Multiparty Computation (SMC), Cloud computing, privacy-preserving and data mining.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog