Open Access Open Access  Restricted Access Subscription Access

Secure Two Party Computation

Ankush Rai


The author investigated the flaws with two-party computation over a cloud or parallel services for an encrypted data which can be easily accessed by any efficient shell programmer. Generally, the computation with the slaves and the master enables the store-to-store data locally, even that may be a constant amount of data and thereby we have found that the third parties can remotely access the n amount of data items, while ensuring that the identities of the items are kept hidden. Hence, in this short communication the author presented a patched protocol for hidden scalable computational environment to safeguard its computing data from outside interventions.

Keywords: Secure computational communication, encryption protocol

Full Text:



  • There are currently no refbacks.

This site has been shifted to