Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

  • Rohit Pathak
  • Satyadhar Joshi
Part of the Communications in Computer and Information Science book series (CCIS, volume 40)


With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP and with the use of Anonymizers we have covered the identity of true source of data. Modifier tokens are generated along encryption of data which are distributed among virtual parties, then sent to TTP and finally used in the computation. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have also given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved.


Secure Multi-party Computation (SMC) Defense Information Security Privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    2005 Report on Terrorism. National Counter Terrorism Center (NCTC). United States of America (2006)Google Scholar
  2. 2.
    2007 Report on Terrorism. National Counter Terrorism Center (NCTC). United States of America (2008)Google Scholar
  3. 3.
    National Commission Up-on Terrorist Attacks in the United States, (retrieved on 2008-01-24)
  4. 4.
    Bin Laden claims responsibility for 9/11. CBC News, (retrieved on 2009-01-11)
  5. 5.
    Spanish Indictment on the investigation of March 11,
  6. 6.
    Spain furious as US blocks access to Madrid bombing ’chief’. The Times, (retrieved 2007-02-15)
  7. 7.
    Incidents in London. United Kingdom Parliament, (retrieved on 2008-07-30)
  8. 8.
    Report into the London Terrorist Attacks on 7 July 2005. Intelligence and Security Committee (May 2006) Google Scholar
  9. 9.
  10. 10.
    Dossier From India Gives New Details of Mumbai Attacks. The New York Times, (retrieved on 2009-01-06)
  11. 11.
    India terrorist attacks leave at least 101 dead in Mumbai. Los Angeles Times,,0,3094137.story (retrieved on 2008-11-27)
  12. 12.
    Foreign Terrorist Organizations List. United States Department of State. USSD Foreign Terrorist Organization, (retrieved on 2007-08-03)
  13. 13.
    Pathak, R., Joshi, S.: Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. In: Proc. of The First International Workshop on Mobile & Wireless Networks (MoWiN 2009) in Conjunction with The Third International Conference on Information Security and Assurance (ISA 2009). LNCS. Springer, Heidelberg (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Rohit Pathak
    • 1
  • Satyadhar Joshi
    • 2
  1. 1.Acropolis Institute of Technology & ResearchIndia
  2. 2.Shri Vaishnav Institute of Technology & ScienceIndoreIndia

Personalised recommendations