Secure multi-party computation

Results: 221



#Item
141Secure multi-party computation / Database / Computing / Data / Information / Deterministic encryption / Cryptography / Homomorphic encryption / Cloud computing

Secure Computation on Encrypted Database Faculty Seminar, MayProfessor David Wai-lok CHEUNG Head, Department of Computer Science

Add to Reading List

Source URL: engg.hku.hk

Language: English - Date: 2009-06-26 21:59:31
142Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2004-05-18 05:27:32
143Cryptographic protocols / File sharing networks / Secure multi-party computation / Peer-to-peer / Communications protocol / Information theory / Scalability / Time complexity / Internet privacy / Theoretical computer science / Information / Data

SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos ETH Zurich, Switzerland {burkhart, strasser, dmany, fontas}@tik.ee

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:22
144Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
145Transmission Control Protocol / Secure multi-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Private Matching Li, Yaping, J.D. Tygar, and Joseph M. Hellerstein IRB-TR[removed]February, 2004

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:48:06
146Secure multi-party computation / Communications protocol / RSA / Transmission Control Protocol / Cryptography / Cryptographic protocols / Public-key cryptography

private_matching_springer.pdf

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:42:25
147Cryptographic protocols / Vectors / Analytic geometry / Binary operations / Secure multi-party computation / Dot product / Vector space / Matrix / Stochastic / Algebra / Mathematics / Linear algebra

A Secure Protocol for Computing String Distance Metrics Pradeep Ravikumar CyLab, Center for Automated Learning and Discovery, School of Computer Science,

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-08 17:30:59
148Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography

Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:32
149Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2002-06-04 13:33:05
150Secure two-party computation / Security parameter / Valuation / Mathematics / Applied mathematics / Cryptographic protocols / Secure multi-party computation / Universal composability

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay∗ Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-03 15:33:45
UPDATE