Data verification protocol for a confidential computing scheme with homomorphic encryption

Download article in PDF format

Authors: Bystrevskiy S. A., Borshevnikov A. E., Dobrzhinskiy Yu. V.

Annotation: Auction trading systems and Big Data technologies play an important role in modern society. However, as soon as these technologies deal with the finances of their users, there is a need to implement security systems in them to ensure the possibility of data verification. The article proposes a data verification pro-tocol based on the use of homomorphic encryption. A formal safety assessment of the developed protocol is shown, and an analysis from a probabilistic standpoint is carried out.

Keywords: auction bidding, data verifica-tion, homomorphic encryption, confidential computing

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates