Secure multi-party computation

Results: 221



#Item
111Smart card / Public-key cryptography / Challenge-response authentication / Pirate decryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Making Privacy-Preserving Data Mining Practical with Smartcards∗ Andrew Y. Lindell† January 20, 2009 Abstract

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
112Secure multi-party computation / Homomorphic encryption / Paillier cryptosystem / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience? Martin Hirt1 , Jesper Buus Nielsen2 , and Bartosz Przydatek1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-03 06:46:06
113Cryptographic protocols / Secure multi-party computation / IP / Communication complexity / Communications protocol / FO / Theoretical computer science / Applied mathematics / Cryptography

Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol Takashi Nishide1,2 and Kazuo Ohta1 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-17 02:37:29
114Information / Secure multi-party computation / Graph theory / Topology / Graph / Neighbourhood / Communications protocol / Vertex / Network topology / Cryptographic protocols / Data / Mathematics

Topology-Hiding Computation Tal Moran ∗ Ilan Orlov † Silas Richelson ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-31 19:21:26
115Software / Universal composability / Data / Secure multi-party computation / Advantage / Actor model / Ciphertext indistinguishability / Adversary model / Security parameter / Cryptographic protocols / Cryptography / Computing

On Concurrently Secure Computation in the Multiple Ideal Query Model∗ Abhishek Jain‡ Vipul Goyal†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 10:35:40
116Information / Cryptography / Secure multi-party computation / Key management / Communications protocol / Lookup table / Homomorphic encryption / Secret sharing / Transmission Control Protocol / Cryptographic protocols / Data / Computing

Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations Pille Pullonen1,2 and Sander Siim1,2 1 Cybernetica AS

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 10:34:14
117Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
118Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
119Secure two-party computation / Function / Inverse function / Universal composability / Cryptographic protocols / Mathematics / Secure multi-party computation

Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov∗ Amos Beimel†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 05:22:34
120Cryptographic protocols / Numbers / Binary arithmetic / Mathematics / Secure multi-party computation / Floating point / Space debris / Single-precision floating-point format / IEEE 754-2008 / Computer arithmetic / Data types / Computing

Secure Floating-Point Arithmetic and Private Satellite Collision Analysis Liina Kamm1,2 and Jan Willemson1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-16 06:08:23
UPDATE