Results 1 - 10
of
21,572
A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
, 2007
"... The fairness of data exchange becomes a key factor for the transaction over the Internet. To ensure the fairness of data exchange, the protocol needs a trusted third party be a judge when the dispute occurs, and has to give a guarantee to main parties during the data exchange. To eliminate the third ..."
Abstract
- Add to MetaCart
the third party’s connectional time and enhance its security, a fair-exchange protocol based on off-line semi-trusted third party has presented in this paper. The protocol employs an off-line semi-trusted third party, where a flexible method for selecting a semi-trusted third party is proposed. Also
Fair Exchange with a Semi-Trusted Third Party (Extended Abstract)
- 4TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY
, 1997
"... We present new protocols for two parties to exchange documents with fairness, i.e., such that no party can gain an advantage by quitting prematurely or otherwise misbehaving. We use a third party that is "semi-trusted", in the sense that it may misbehave on its own but will not conspire wi ..."
Abstract
-
Cited by 102 (2 self)
- Add to MetaCart
We present new protocols for two parties to exchange documents with fairness, i.e., such that no party can gain an advantage by quitting prematurely or otherwise misbehaving. We use a third party that is "semi-trusted", in the sense that it may misbehave on its own but will not conspire
IEEE TRANSACTIONS ON JOURNAL NAME, MANUSCRIPT ID 1 DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
"... Abstract—Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cl ..."
Abstract
- Add to MetaCart
in the cloud. Wholesale of data by cloud service provider is yet another problem that is faced in the cloud environment. Consequently, high-level of security measures is required. In this paper, we propose Data Security for Cloud Environment with Semi-Trusted Third Party (DaSCE), a data security system
A Security Protocol for Certified Egoods Delivery
- Proc. IEEE Int. Conf. Information Technology, Coding, and Computing (ITCC’04), Las Vegas
, 2004
"... This paper presents an efficient security protocol for certified e-goods delivery with the following features: (1) ensures strong fairness, (2) ensures nonrepudiation of origin and non-repudiation of receipt, (3) allows the receiver of an e-goods to verify, during the protocol execution, that the e- ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
-goods he is about to receive is the one he is signing the receipt for, (4) does not require the active involvement of a fully trusted third party, but rather an off-line and transparent semi-trusted third party (STTP) only in cases of unfair behaviour by any party, and (5) provides confidentiality
1 2 3 4 5 6 7 8
"... The last few years have shown a growing interest in dis-tributed noise reduction for speech enhancement in wireless acoustic sensor networks. With this new generation of speech processing algorithms, part of the processing is done at pro-cessors not necessarily owned by the user. As a consequence, p ..."
Abstract
- Add to MetaCart
-called homomorphic encryption techniques and semi-trusted third parties. Index Terms — Distributed speech enhancement, encryp-tion, privacy.
A secure and fair DSAbased signature exchange protocol
- 9th IEEE Symposium on Computers and Communications (ISCC’2004), pp.412–417
, 2004
"... This paper presents a novel protocol for fair exchange of DSA-based signatures to support an e-commerce activity of digital contract signing. The protocol employs an off-line semi-trusted third party (STTP), which participates in the protocol execution only in exceptional circumstances and which inv ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
This paper presents a novel protocol for fair exchange of DSA-based signatures to support an e-commerce activity of digital contract signing. The protocol employs an off-line semi-trusted third party (STTP), which participates in the protocol execution only in exceptional circumstances and which
1User-Defined Privacy Grid System for Continuous Location-Based Services
"... Abstract—Location-based services (LBS) require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for LBS have several limitations, suc ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
-preserving snapshot and continuous LBS. (1) The system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user’s location. (2) Secure snapshot and continuous location privacy is guaranteed
ca
"... Increasing efficiency in hospitals is of particular importance. Studies that combine data from multiple hospitals/data holders can tremendously improve the statistical outcome and aid in identifying efficiency markers. However, combining data from multiple sources for analysis poses privacy risks. A ..."
Privacy-Enhanced Searches Using Encrypted Bloom Filters
, 2004
"... It is often necessary for two or more or more parties that do not fully trust each other to selectively share data. We propose a search scheme based on Bloom filters and Pohlig-Hellman encryption. A semi-trusted third party can transform one party's search queries to a form suitable for queryin ..."
Abstract
-
Cited by 48 (1 self)
- Add to MetaCart
It is often necessary for two or more or more parties that do not fully trust each other to selectively share data. We propose a search scheme based on Bloom filters and Pohlig-Hellman encryption. A semi-trusted third party can transform one party's search queries to a form suitable
Results 1 - 10
of
21,572