IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Blockchain Security Using Secure Multi-Party Computation

Blockchain Security Using Secure Multi-Party Computation
View Sample PDF
Author(s): Jenila Livingston L. M. (Vellore Institute of Technology, India), Ashutosh Satapathy (Vellore Institute of Technology, India), Agnel Livingston L. G. X. (St. Xavier's Catholic College of Engineering, India)and Merlin Livingston L. M. (Jeppiaar Institute of Technology, India)
Copyright: 2021
Pages: 18
Source title: Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles
Source Author(s)/Editor(s): Amit Kumar Tyagi (Research Division of Advanced Data Science, Vellore Institute of Technolgy, Chennai, India), Gillala Rekha (K. L. University, India)and N. Sreenath (Pondicherry Engineering College, India)
DOI: 10.4018/978-1-7998-3295-9.ch011

Purchase

View Blockchain Security Using Secure Multi-Party Computation on the publisher's website for pricing and purchasing information.

Abstract

In secure multi-party computation (SMC), multiple distributed parties jointly carry out the computation over their confidential data without compromising data security and privacy. It is a new emerging cryptographic technique used in huge applications such as electronic auction bidding, electronic voting, protecting personal information, secure transaction processing, privacy preserving data mining, and privacy preserving cooperative control of connected autonomous vehicles. This chapter presents two model paradigms of SMC (i.e., ideal model prototype and real model prototype). It also deals with the type and applications of adversaries, properties, and the techniques of SMC. The three prime types of SMC techniques such as randomization, cryptographic techniques using oblivious transfer, and anonymization methods are discussed and illustrated by protective procedures with suitable examples. Finally, autonomous vehicle interaction leveraged with blockchain technology to store and use vehicle data without any human interaction is also discussed.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom