Secure multi-party computation

Results: 221



#Item
191Information / Failure / Fault tolerance / Theory of computation / Cryptographic protocols / Verifiable secret sharing / Secure multi-party computation / Communications protocol / Byzantine fault tolerance / Cryptography / Data / Computing

Fault-Tolerant Distributed Computing in Full-Information Networks Shafi Goldwasser∗ CSAIL, MIT Cambridge MA, USA Elan Pavlov

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:28:28
192Cryptographic protocols / Communication / Communication complexity / Computational complexity theory / Quantum complexity theory / Quantum information science / Communications protocol / IP / Secure multi-party computation / Theoretical computer science / Applied mathematics / Information

DIMACS Technical Report[removed]Version of 2010–01–19 Approximate Privacy: PARs for Set Problems by Joan Feigenbaum1,2

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2010-01-20 15:00:17
193Ethics / Mathematical sciences / Secure multi-party computation / Data mining / Privacy / Cluster analysis / Cryptography / Internet privacy / Statistics / Data analysis / Formal sciences

PORTIA Privacy, Obligations, and Rights in Technologies of Information Assessment Accountability in Privacy-Preserving

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:20:58
194Data analysis / Data mining / Secure multi-party computation / Internet privacy / Information privacy / Cryptographic hash function / Ethics / Data protection / Privacy

Privacy-Preserving Data Mining and Data Sharing 10 October 2006 Privacy-Preserving Data Mining and Data Sharing

Add to Reading List

Source URL: datamining.anu.edu.au

Language: English - Date: 2011-05-31 01:27:15
195Secret sharing / Secure multi-party computation / Information / Cyberwarfare / Security / Polynomials / Orthogonal polynomials / Cryptographic protocols / Cryptography / Verifiable secret sharing

Round-Optimal and Efficient Verifiable Secret Sharing Matthias Fitzi1? , Juan Garay2?? , Shyamnath Gollakota3? ? ? , C. Pandu Rangan3† , and Kannan Srinathan4 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2007-04-05 18:50:42
196Secret sharing / Cloud computing / Secure multi-party computation / Access structure / Yvo G. Desmedt / Cryptography / Cryptographic protocols / Key management

CETA Workshop–November 2011-Secret Sharing and Reliable Cloud Computing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:13:20
197Internet protocols / Data / Freedesktop.org / X Window System / Port / Secure multi-party computation / Software / Cryptographic protocols / Computing

Scaling Private Set Intersection to Billion-Element Sets Seny Kamara1 , Payman Mohassel2 , Mariana Raykova3 , and Saeed Sadeghian2 1 2 Microsoft Research

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:17:08
198Privacy / Internet privacy / Data / Information / Cryptographic protocols / Secure multi-party computation / Ethics

CONTACT: ROBERT CARRUTHERS• [removed] • [removed] Efficient Multi-Party Private Function Evaluation for Secure Data Analysis TECH ID #: 1004.1

Add to Reading List

Source URL: www.innovatecalgary.com

Language: English - Date: 2014-03-03 17:02:49
199Anonymous veto network / Dining cryptographers problem / Secure multi-party computation / RSA / Transmission Control Protocol / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

The Power of Anonymous Veto in Public Discussion Feng Hao1 and Piotr Zieli´ nski2, 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-10 14:54:54
200Bloom filter / Hashing / Set / Secure multi-party computation / Bit array / Multiset / Filter / Intersection / Cardinality / Mathematics / Mathematical logic / Binary operations

Fast Private Set Operations with SEPIA Dilip Many [removed] Martin Burkhart [removed]

Add to Reading List

Source URL: www.sepia.ee.ethz.ch

Language: English - Date: 2012-03-01 14:38:01
UPDATE