Paper 2015/804

SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE

Sumit Chakraborty

Abstract

Abstract: This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. The definition of bioterrorism has been changed in terms of information security. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges. Keywords: Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism, Secure multi-party computation, Applied cryptography.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Security intelligenceThreat analyticsBusiness intelligenceCross border bio-terrorismSecure multi-party computationApplied cryptography
Contact author(s)
schakraborty2010 @ hotmail com
History
2015-09-24: revised
2015-08-13: received
See all versions
Short URL
https://ia.cr/2015/804
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/804,
      author = {Sumit Chakraborty},
      title = {{SECURE} {MULTI}-{PARTY} {COMPUTATION}: {HOW} {TO} {SOLVE} {THE} {CONFLICT} {BETWEEN} {SECURITY} & {BUSINESS} {INTELLIGENCE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/804},
      year = {2015},
      url = {https://eprint.iacr.org/2015/804}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.