Cryptology ePrint Archive: Report 2015/804

SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE

Sumit Chakraborty

Abstract: Abstract: This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. The definition of bioterrorism has been changed in terms of information security. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges. Keywords: Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism, Secure multi-party computation, Applied cryptography.

Category / Keywords: Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism, Secure multi-party computation, Applied cryptography

Date: received 11 Aug 2015, last revised 23 Sep 2015

Contact author: schakraborty2010 at hotmail com

Available format(s): PDF | BibTeX Citation

Version: 20150924:040608 (All versions of this report)

Short URL: ia.cr/2015/804

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]