Secure Two Party Computation
The author investigated the flaws with two-party computation over a cloud or parallel services for an encrypted data which can be easily accessed by any efficient shell programmer. Generally, the computation with the slaves and the master enables the store-to-store data locally, even that may be a constant amount of data and thereby we have found that the third parties can remotely access the n amount of data items, while ensuring that the identities of the items are kept hidden. Hence, in this short communication the author presented a patched protocol for hidden scalable computational environment to safeguard its computing data from outside interventions.
Keywords: Secure computational communication, encryption protocol
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/