JOURNAL ARTICLE

Trust Enabled Secure Multiparty Computation

Abstract

Hamiltonian cycles play an important role in graph theory and data mining applications. Two Hamiltonian cycles that don't have an edge in common are known as edge-disjoint Hamiltonian cycles (EDHCs). EDHCs are useful in computer networks. They have found applications in improving network capacity, fault-tolerance and collusion resistant mining algorithms. This paper extends previous work on collusion resistance capability of data mining algorithms. We first propose a new trust model for network computers. We then use this model as a basis to improve the collusion resistance capability of data mining algorithms. We use a performance metric to quantify the improvement.

Keywords:
Collusion Computer science Computation Data mining Disjoint sets Theoretical computer science Distributed computing Algorithm Mathematics

Metrics

3
Cited By
0.40
FWCI (Field Weighted Citation Impact)
11
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

BOOK-CHAPTER

Secure Multiparty Computation

Year: 2011 Pages: 1121-1121
BOOK-CHAPTER

Multiparty Secure Computation

Himanshu TyagiShun Watanabe

Cambridge University Press eBooks Year: 2023 Pages: 432-461
BOOK-CHAPTER

Secure Multiparty Computation

Keith B. Frikken

Chapman & Hall/CRC applied algorithms and data structures series Year: 2009 Pages: 1-16
JOURNAL ARTICLE

Secure multiparty computation

Yehuda Lindell

Journal:   Communications of the ACM Year: 2020 Vol: 64 (1)Pages: 86-96
© 2026 ScienceGate Book Chapters — All rights reserved.