An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 12
Abstract
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over limited fields improves the scalability of the algorithms. Another form of anonymity as used in secure multiparty computation allows multiple parties on a network to together carry out a global computation that depends on data from each party while the data supposed by each party remains unknown to the other parties. The new algorithms are constructed on top of a secure sum data mining operation using Newton’s identities and Sturm’s theorem. An algorithm for distributed solution of convinced polynomials over limited fields improves the scalability of the algorithms. Markov chain representations are used to find statistics on the number of iterations required and computer algebra gives closed form results for the completion rates.
Authors and Affiliations
Morampudi Satya Harish| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, msatyaharish3@gmail.com, Dr A. Rama Murthy| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ram111_sai@yahoo.com, K. T. V Subbarao| Department of Computer Science And Engineering, Akula Sree Ramulu institute of Engineering and Technology, prathipadu,Tadepalligudem,A.P,India, ogidi@rediffmail.com
Keyword based pursuit in content rich multidimensional datasets encourages numerous novel applications and instruments. In this we consider objects that are tagged with watchwords and are inserted in a vector space. F...
Harmonics Reduction of a Single Phase Half Bridge Inverter
This paper displays a way to deal with minimize the sounds contained in the output of a solitary stage half scaffold inverter. With a perspective to decreasing Harmonic a LC low pass filter is utilized which hinders...
An Energy Based Fuzzy Logic Dc-Link Voltage Controller For Three Phase DSTATCOM To Compensate AC Loads
it is very important to compensate the transient response of DSTATCOM for unbalanced and nonlinear loads. Majorly the dc link voltage will be varied, when any small change in the load side. The proper operation of DS...
Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets
In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false bu...
Genetically Optimized Pre coders Transceiver Design for Double STBC System
Wireless communications depends on multiple-inputmultiple-output (MIMO) techniques for high data rates. Feedback of channel information can be used in precoding to use the strongest channel mode and improve MIMO perfor...