Browse > Article
http://dx.doi.org/10.17662/ksdim.2019.15.1.061

Secure Multi-Party Computation of Technology FinTech  

Park, Chankil (숭실사이버대학교 정보보안학과)
Choi, Youngwha (한국폴리텍대학 정수캠퍼스 모바일정보통신과)
Lee, Cheulhee (한국폴리텍대학 정수캠퍼스 모바일정보통신과)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.15, no.1, 2019 , pp. 61-66 More about this Journal
Abstract
FinTech has expanded to the extent that not only businesses but almost everyone can feel the impact. The spread of the scope of use has introduced a variety of new financial services that are changing the way we live. In these environments, it is important to develop reliable security measures to protect against cyber attacks. The number of mobile financial transactions in the financial sector is also increasing, making security vulnerable. In this study, we studied security through mutual authentication method that can safely handle financial security and focused on FinTech's security processing through multi-party mutual authentication method that strongly prevents leakage of information even in the event of continuous and sophisticated attacks.
Keywords
FinTech; Security; Information Leakage Prevention; Authentication; Secure Computation; Secure Multi-party Computation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 MOHASSEL, P., AND FRANKLIN, M. Efficiency tradeoffs for malicious two-party computation. In Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography (Berlin, Heidelberg, 2006), PKC'06, Springer-Verlag, pp. 458-473.
2 NIELSEN, J. B., NORDHOLT, P. S., ORLANDI, C., AND BURRA, S. S. A New Approach to Practical Active-Secure Two Party Computation. In Proceedings of the 32th Annual International Cryptology Conferenceon Advancesin Cryptology(2012), CRYPTO '12. http://eprint.iacr.org/2011/091.
3 OSADCHY, M., PINKAS, B., JARROUS, A., AND MOSKOVICH, B. Scifi - a system for secure face identification. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2010), SP '10, IEEE Computer Society, pp. 239-254.
4 최희식, 조양현, "모바일 앱 서비스 이용 증가로 인한 보안 위협 분석," (사)디지털산업정보학회 논문지, 2018년3월, 14권1호, pp.45-55.
5 About Macromill: http://www.macromill.com/honote/20160405/report.html
6 T. Araki, J. Furukawa, Y. Lindell, A. Nof, and K. Ohara, High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. ACM CCS, 2016.
7 J. Furukawa, Y. Lindell, A. Nof, and O. Weinstein, High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority, to appear in Eurocrypt2017
8 MALKA, L. Vmcrypt: modular software architecture for scalable secure computation. In Proceedings of the 18th ACM conference on Computer and communications security (New York, NY, USA, 2011), CCS '11, ACM, pp. 715 - 724.