Secure multi-party computation

Results: 221



#Item
181Secure multi-party computation / Computing / Privacy / Cryptography / Computer security / Computer science / Actor model / Internet privacy / Cryptographic protocols / Ethics / Security

Security Research Group www.jeffersonswheel.org David Evans

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-07-22 14:21:36
182Pseudorandom generator / Malleability / Commitment scheme / Semantic security / Provable security / Pseudorandom function family / Secure multi-party computation / Pseudorandom number generator / Cramer–Shoup cryptosystem / Cryptography / Random oracle / One-way function

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
183Electronic commerce / Homomorphic encryption / ElGamal encryption / Learning with errors / Threshold cryptosystem / RSA / Semantic security / Secure multi-party computation / Cipher / Cryptography / Public-key cryptography / Cryptographic protocols

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov∗ Abhishek Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-11 13:30:56
184Cryptographic protocols / Fault-tolerant computer systems / Consensus / Secure multi-party computation / Communications protocol / Transmission Control Protocol / IP / FO / Theoretical computer science / Data / Applied mathematics

Distributed Consensus in the Presence of Sectional Faults S. Amitanand" I. Sanketh- K. Srinathant*

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:05
185Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
186Electronic toll collection / Transportation in the United States / Internet privacy / Ń / TRUSTe / Privacy / N / Secure multi-party computation / Ethics / Technology / E-ZPass

VPriv: Protecting Privacy in LocationBased Vehicular Services Raluca Ada Popa and Hari Balakrishnan Computer Science and Artificial Intelligence Laboratory, M.I.T. Andrew Blumberg

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:20:56
187Ciphertext indistinguishability / Secure multi-party computation / Advantage / Security parameter / Commitment / One-way function / Secret sharing / Public-key cryptography / Zero-knowledge proof / Cryptography / Cryptographic protocols / Commitment scheme

Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories, Japan. [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 19:58:40
188Homomorphic encryption / Electronic commerce / Ciphertext indistinguishability / Secure multi-party computation / Secret sharing / Cipher / RSA / ElGamal encryption / Semantic security / Cryptography / Public-key cryptography / Cryptographic protocols

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana L´opez-Alt New York University Eran Tromer∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-07 16:19:48
189Universal composability / Computing / Secure multi-party computation / Secure two-party computation / Communications protocol / Universal Turing machine / Cryptography / Turing machine / Cryptographic protocols / Data / Information

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti∗ Asaf Cohen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:39:30
190Finite fields / Key management / Secret sharing / Linear code / Algebraic geometry / Secure multi-party computation / RSA / Secret sharing using the Chinese remainder theorem / Verifiable secret sharing / Cryptography / Cryptographic protocols / Coding theory

Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:27
UPDATE