Secure multi-party computation

Results: 221



#Item
201Information / Secure multi-party computation / Oblivious transfer / Secure two-party computation / Communications protocol / Lookup table / Transmission Control Protocol / Zero-knowledge proof / One-way function / Cryptographic protocols / Data / Computing

Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-01-09 00:12:19
202Artificial intelligence / Automatic identification and data capture / Facial recognition system / Surveillance / Password / FERET / Secure multi-party computation / Security / Face / Face recognition / Cryptographic protocols / Cryptography

SCiFI – A System for Secure Face Identification Margarita Osadchy University of Haifa Benny Pinkas University of Haifa

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2010-04-17 15:14:29
203Public-key cryptography / Internet Relay Chat / HTTP Secure / Diffie–Hellman key exchange / Secure Remote Password protocol / Secure Shell / Cryptographic protocols / Cryptography / Secure multi-party computation

Canon-MPC, A System for Casual Non-Interactive Secure Multi-Party Computation Using Native Client ∗ Ayman Jarrous

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2014-03-04 08:27:08
204Secure two-party computation / Communication complexity / Oblivious transfer / IP / Communications protocol / Public-key cryptography / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:01
205Computing / Secure multi-party computation / Secure two-party computation / Pseudorandom generator / Circuit / Boolean circuit / Transmission Control Protocol / Computer / Actor model / Cryptographic protocols / Theoretical computer science / Applied mathematics

FairplayMP – A System for Secure Multi-Party Computation Assaf Ben-David∗ Noam Nisan∗ Benny Pinkas†

Add to Reading List

Source URL: www.cs.huji.ac.il

Language: English - Date: 2008-09-03 07:33:47
206Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation

Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2009-04-09 09:23:00
207Cryptography / Computing / Secure two-party computation / Communications protocol / Commitment scheme / Secure multi-party computation / Oblivious transfer / Port / Transmission Control Protocol / Cryptographic protocols / Data / Information

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
208Digital circuits / Cryptographic protocols / Mathematics / Computational complexity theory / Secure multi-party computation / Boolean circuit / Multiplexer / Circuit / Boolean algebra / Theoretical computer science / Computing / Algebraic logic

Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-07-02 10:26:47
209Decision trees / Theoretical computer science / Secure multi-party computation / ID3 algorithm / Decision tree learning / ID3 / Secure two-party computation / Communication complexity / Oblivious transfer / Cryptographic protocols / Data / Information

Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-02-17 13:42:09
210Secure multi-party computation / Internet privacy / Information privacy / Oblivious transfer / Cryptographic protocols / Ethics / Privacy

Privacy-Preserving Methods for Sharing Financial Risk Exposures∗ Emmanuel A. Abbe,1,2 Amir E. Khandani,3 Andrew W. Lo2,3,4∗ 1 EPFL School of Communication and Computer Sciences

Add to Reading List

Source URL: www.argentumlux.org

Language: English - Date: 2011-12-14 10:13:24
UPDATE