Secure multi-party computation

Results: 221



#Item
161Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
162Business / Financial cryptography / Cryptographic protocols / Bitcoin / Peer-to-peer computing / Electronic money / Secure multi-party computation / PayPal / Public-key cryptography / Cryptography / Payment systems / Electronic commerce

Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-03-18 15:18:38
163Boolean algebra / Applied mathematics / Theoretical computer science / PROPT / Secure multi-party computation / Numerical software / Mathematics

Parallel Multi-Party Computation from Linear Multi-Secret Sharing Schemes ? Zhifang Zhang1 , Mulan Liu1?? , and Liangliang Xiao2 1 Academy of Mathematics and Systems Science, Key Laboratory of Mathematics

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
164Oblivious transfer / Secure multi-party computation / Decisional Diffie–Hellman assumption / ElGamal encryption / XTR / IP / Degree of a polynomial / Proof of knowledge / Cryptography / Cryptographic protocols / Polynomials

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay∗ Abstract In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-03 11:03:18
165Social issues / Law / Internet privacy / Secure multi-party computation / Medical privacy / Data mining / Privacy policy / Electronic Privacy Information Center / Privacy / Ethics / Identity management

PDF Document

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2014-10-17 16:12:19
166Secure multi-party computation / Internet privacy / Information privacy / Oblivious transfer / Cryptographic protocols / Ethics / Privacy

Privacy-Preserving Methods for Sharing Financial Risk Exposures∗ Emmanuel A. Abbe,1,2 Amir E. Khandani,3 Andrew W. Lo2,3,4∗ 1 EPFL School of Communication and Computer Sciences

Add to Reading List

Source URL: secure.brightworkinc.net

Language: English - Date: 2011-12-14 10:13:24
167Austrian Institute of Technology / Secure multi-party computation / Maurer / Quantum information science / Cryptography / Seibersdorf / Cloud computing

AIT Austrian Institute of Technology, the Austrian research institute with European format which focuses on the key infrastructure issues of the future, is looking to strengthen its team in the Safety and Security Depart

Add to Reading List

Source URL: www.ait.ac.at

Language: English - Date: 2015-01-08 04:24:00
168Statistics / Synthetic data / Database management systems / Data mining / Database / Secure multi-party computation / Record linkage / Data quality / Regression analysis / Data management / Information / Data

NISS Secure Regression on Distributed Databases Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, and Jerome P. Reiter Technical Report Number 141

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2004-08-30 09:30:40
169National security / Crime prevention / Government of the United States / Multistate Anti-Terrorism Information Exchange / Data mining / Information Awareness Office / Information privacy / Secure multi-party computation / Internet privacy / Ethics / Privacy / Security

NISS Homeland Insecurity: Datamining, Terrorism Detection, and Confidentiality Stephen E. Fienberg

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2005-01-04 13:20:38
170Linear regression / Cross-validation / Secure multi-party computation / Stepwise regression / Nonparametric regression / Predictive analytics / Statistics / Regression analysis / Multivariate adaptive regression splines

NISS Secure computation with horizontally partitioned data using adaptive regressive splines Joyee Ghosh, Jerome P. Reiter, and Alan F. Karr

Add to Reading List

Source URL: www.niss.org

Language: English - Date: 2006-06-23 13:47:34
UPDATE