Secure computation protocols under asymmetric scenarios in enterprise information system

ABSTRACTIt has become acentral question to guarantee the security of sensitive data in enterprise information systems. Actually, different enterprises may grasp asymmetric information due to their ...

[1]  Florian Kerschbaum Building a privacy-preserving benchmarking enterprise system , 2008, Enterp. Inf. Syst..

[2]  Abhi Shelat,et al.  Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.

[3]  A. K. Pal,et al.  On the Fairness of Groce–Katz’s Protocol for Rational Players∗ , 2016 .

[4]  Yehuda Lindell,et al.  Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, Journal of Cryptology.

[5]  C. Pandu Rangan,et al.  Rational Secret Sharing with Repeated Games , 2008, ISPEC.

[6]  Ghizlane Orhanou,et al.  Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..

[7]  David C. Parkes,et al.  Fairness with an Honest Minority and a Rational Majority , 2009, TCC.

[8]  Zheng Wang,et al.  Verification and validation in railway signalling engineering – an application of enterprise systems techniques , 2014, Enterp. Inf. Syst..

[9]  Ran Canetti,et al.  Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.

[10]  Yehuda Lindell,et al.  Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, CRYPTO.

[11]  Keisuke Tanaka,et al.  A Rational Secret-Sharing Scheme Based on RSA-OAEP , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Latifa Ben Arfa Rabai,et al.  A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..

[13]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[14]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[15]  Cai Yongquan,et al.  A Verifiable Rational Secret Sharing Scheme Based on Bilinear Pairing , 2012 .

[16]  C. Pandu Rangan,et al.  Rational Secret Sharing with Honest Players over an Asynchronous Channel , 2011, IACR Cryptol. ePrint Arch..

[17]  C. Pandu Rangan,et al.  The deterministic protocol for rational secret sharing , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[18]  Feng Jiang,et al.  Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.

[19]  Ueli Maurer,et al.  Collusion-Preserving Computation , 2012, IACR Cryptol. ePrint Arch..

[20]  Sergei Izmalkov,et al.  Verifiably Secure Devices , 2008, TCC.

[21]  Abhi Shelat,et al.  Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.

[22]  Keisuke Tanaka,et al.  A Game-Theoretic Perspective on Oblivious Transfer , 2012, ACISP.

[23]  Abhi Shelat,et al.  Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.

[24]  Peng Zhang,et al.  e-DMDAV: A new privacy preserving algorithm for wearable enterprise information systems , 2018, Enterp. Inf. Syst..

[25]  Ran Canetti,et al.  Universally Composable Security with Local Adversaries , 2012, SCN.

[26]  Xi Chen,et al.  One-time rational secret sharing scheme based on bayesian game , 2011, Wuhan University Journal of Natural Sciences.

[27]  Zhifang Zhang,et al.  Rational secret sharing as extensive games , 2013, Science China Information Sciences.

[28]  Xiaoyu,et al.  Rational Secret Sharing Protocol with Fairness , 2012 .

[29]  Abhi Shelat,et al.  Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.

[30]  Chunhui Li,et al.  Principal whitened gradient-projection algorithm for distribution control , 2013, Science China Information Sciences.

[31]  Brij B. Gupta,et al.  A novel approach to defend multimedia flash crowd in cloud environment , 2017, Multimedia Tools and Applications.

[32]  Ueli Maurer,et al.  Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[33]  Cai,et al.  A New Rational Secret Sharing Scheme , 2010 .

[34]  Jonathan Katz,et al.  Fair Computation with Rational Players , 2012, EUROCRYPT.

[35]  Alon Rosen,et al.  Sequential Rationality in Cryptographic Protocols , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[36]  Yehuda Lindell,et al.  Complete Fairness in Secure Two-Party Computation , 2011, JACM.

[37]  XU Qiu-liang New rational secret sharing , 2009 .

[38]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[39]  Arpita Maitra,et al.  Fairness in Secure Two-Party Computation with Rational Players , 2015, IACR Cryptol. ePrint Arch..

[40]  Brij B. Gupta,et al.  Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing , 2017, Multimedia Tools and Applications.

[41]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[42]  Georg Fuchsbauer,et al.  Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..

[43]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[44]  Tianqing Zhu,et al.  Reward-based spatial crowdsourcing with differential privacy preservation , 2017, Enterp. Inf. Syst..

[45]  Duncan S. Wong,et al.  Fair two-party computation with rational parties holding private types , 2015, Secur. Commun. Networks.

[46]  Brij B. Gupta,et al.  Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing , 2018, Int. J. E Serv. Mob. Appl..

[47]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[48]  Tao Li,et al.  A brief survey on secure multi-party computing in the presence of rational parties , 2015, J. Ambient Intell. Humaniz. Comput..

[49]  Jonathan Katz,et al.  Partial Fairness in Secure Two-Party Computation , 2010, Journal of Cryptology.

[50]  A. K. Pal,et al.  Revisiting Secure Two-Party Computation with Rational Players , 2016 .

[51]  Sergei Izmalkov,et al.  Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[52]  Yi Yang,et al.  Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol , 2012, J. Networks.

[53]  Ruchika Asija,et al.  Healthcare SaaS Based on a Data Model with Built-In Security and Privacy , 2016, Int. J. Cloud Appl. Comput..

[54]  Abhi Shelat,et al.  Collusion-free protocols , 2005, STOC '05.