About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Workshop on the Value of Security through Collaboration

Research Article

Secure Computation for Data Privacy

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550308,
        author={Meena Singh and Ashutosh Saxena},
        title={Secure Computation for Data Privacy},
        proceedings={3rd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2008},
        month={6},
        keywords={Data Privacy Mobile Code Reducible Rank Code Secure Computation.},
        doi={10.1109/SECCOM.2007.4550308}
    }
    
  • Meena Singh
    Ashutosh Saxena
    Year: 2008
    Secure Computation for Data Privacy
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOM.2007.4550308
Meena Singh1,*, Ashutosh Saxena1,*
  • 1: Application Security and Privacy Group, SET Labs, Infosys Technologies Limited, Hyderabad, Andhra Pradesh, INDIA, 500019.
*Contact email: MeenaDilip_Singh@infosys.com, Ashutosh_Saxena01@infosys.com

Abstract

The Secure Mobile Code is a fragment of code being executed in some unfamiliar and untrusted environment. Protecting integrity and maintaining confidentially of the code execution in unfamiliar environment has been a challenging task. The host environment may try to guess the functionality of the code received. This generates a need to design a scheme that can perform secure computation on encoded data and leaving no clues for the host to guess the functionality and data. In our scheme, the sender will generate the code which is transformed to hide the functionality and she will send it along with encoded data to the host. Subsequently, the host will run the code on the encoded data and send the result to the sender. The functionality is protected by the encoded gates where the truth table is transformed using the Reducible Rank Codes[1]. We also present a detail security analysis and complexity of our scheme. Our scheme finds application where the data computation has been outsourced to other party.

Keywords
Data Privacy Mobile Code Reducible Rank Code Secure Computation.
Published
2008-06-24
Publisher
IEEE
Modified
2011-08-03
http://dx.doi.org/10.1109/SECCOM.2007.4550308
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL