Secure multi-party computation

Results: 221



#Item
31Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi

Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
32Circuit complexity / Complexity classes / Secure multi-party computation / Computational complexity theory / Digital circuits / Circuit / Boolean circuit / CC / Hash function / NC

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Benjamin Mood Yale University

Add to Reading List

Source URL: work.debayangupta.com

Language: English - Date: 2014-08-25 13:51:41
33Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
34Cryptography / Secure multi-party computation / Secret sharing / Cryptographic protocol / Communications protocol

Systematizing Secure Computation for Research and Decision Support Jason Perry, Debayan Gupta, Joan Feigenbaum and Rebecca N. Wright Rutgers University, Yale University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2014-09-07 12:36:30
35Secure multi-party computation / Software Guard Extensions / Cryptography / Singapore Exchange / Secure two-party computation / Eval / Communications protocol / Cryptographic protocol

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

Add to Reading List

Source URL: work.debayangupta.com

Language: English - Date: 2016-01-22 16:19:24
36Cryptography / Verifiable secret sharing / Secret sharing / Secure multi-party computation / Net / Cheap talk / Constructible universe / Expected value / Quantum Byzantine agreement / Stable distribution

Scalable Rational Secret Sharing [Extended Abstract] Varsha Dani Mahnush Movahedi

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
37Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Secure multi-party computation / Paillier cryptosystem / Communications protocol / Cryptographic protocol / Secret sharing / Data Encryption Standard

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
38Quantum complexity theory / Computational complexity theory / Cryptography / Functions and mappings / Secure multi-party computation / Secure two-party computation / Communication complexity / Limit of a function / Pi / Cryptographic protocol / PP / Approximation algorithm

Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2006-09-25 10:55:42
39Public-key cryptography / Secure multi-party computation / Homomorphic encryption / Algorithm / Block cipher mode of operation / Communications protocol / Cryptographic protocol

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34
40Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05
UPDATE