Secure multi-party computation

Results: 221



#Item
121Computing / Information / Secure multi-party computation / Zero-knowledge proof / Actor model / Communications protocol / Ciphertext indistinguishability / X Window System / Commitment scheme / Cryptographic protocols / Cryptography / Data

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
122Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security

Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-20 14:16:00
123Identification / Information / Fingerprints / Surveillance / Secure multi-party computation / Fingerprint / Iris recognition / Public key fingerprint / Homomorphic encryption / Biometrics / Security / Cryptography

biom-ident-tech-report.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-16 22:47:34
124Genetics / Biology / DNA / Secure multi-party computation / Genetic testing / Boolean circuit / Parental testing / DNA profiling / Actor model / Cryptographic protocols / Applied genetics / Cryptography

Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton and Fattaneh Bayatbabolghani Department of Computer Science and Engineering University of Notre Dame mbl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 22:08:08
125Secure multi-party computation / Communications protocol / X Window System / Public-key cryptography / Cryptography / Cryptographic protocols / Universal composability

Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs∗ Dafna Kidron† Yehuda Lindell‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-06 06:39:24
126Key management / Zero-knowledge proof / Secure multi-party computation / Standard model / Secure two-party computation / Alice and Bob / IP / Trusted third party / Public key infrastructure / Cryptography / Cryptographic protocols / Public-key cryptography

Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 09:16:36
127Secure multi-party computation / Secret sharing / Finite fields / XTR / Cryptography / Cryptographic protocols / Advanced Encryption Standard

Secure Multiparty AES (full paper) Ivan Damg˚ ard and Marcel Keller Dept. of Computer Science, Aarhus University, Denmark {ivan,mkeller}@cs.au.dk

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-11 11:55:52
128Communications protocol / Secure multi-party computation / Common reference string model / Secure two-party computation / Commitment scheme / Security parameter / Universal composability / Cryptographic protocols / Data / Information

Obtaining Universally Composable Security: Towards the Bare Bones of Trust∗ Ran Canetti† December 15, 2007 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-18 22:27:46
129Differential privacy / Secure multi-party computation / Cipher / Privacy / Homomorphic encryption / Internet privacy / ElGamal encryption / Cryptography / Public-key cryptography / Data privacy

Privacy-Preserving Aggregation of Time-Series Data Elaine Shi PARC/UC Berkeley T-H. Hubert Chan The University of Hong Kong

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2011-02-10 19:20:15
130Formal sciences / Computer security / Privacy / Internet privacy / Data mining / Aladdin / Computing / Cryptographic protocols / Ethics / Secure multi-party computation

Making Privacy-Preserving Data Mining Practical with Smartcards Andrew Lindell Aladdin Knowledge Systems & Bar-Ilan University Joint work with Carmit Hazay (Bar-Ilan University)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
UPDATE