Secure multi-party computation

Results: 221



#Item
41Appeared as a comment on the Science website. Link. Comments in Science are subject to evaluation and only accepted comments are published. Multiparty Computation: Role of computation and protocol in privacy leakage Muha

Appeared as a comment on the Science website. Link. Comments in Science are subject to evaluation and only accepted comments are published. Multiparty Computation: Role of computation and protocol in privacy leakage Muha

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2015-11-16 12:47:54
42Aggelos Kiayias  www.kiayias.com Scaling Bitcoin Securely Monday, May, 11-12:30pm

Aggelos Kiayias www.kiayias.com Scaling Bitcoin Securely Monday, May, 11-12:30pm

Add to Reading List

Source URL: bitcoinschool.gr

Language: English - Date: 2016-05-29 14:13:09
43Full statistical analyses with secure multi-party computation Dan Bogdanov, Liina Kamm, Ville Sokk

Full statistical analyses with secure multi-party computation Dan Bogdanov, Liina Kamm, Ville Sokk

Add to Reading List

Source URL: www.humangenomeprivacy.org

Language: English - Date: 2015-03-20 16:30:12
    44The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

    The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    45Fair Two-Party Computations via Bitcoin Deposits? Marcin Andrychowicz?? , Stefan Dziembowski? ? ? , Daniel Malinowski† and Łukasz Mazurek‡ University of Warsaw  Abstract. We show how the Bitcoin currency system (wit

    Fair Two-Party Computations via Bitcoin Deposits? Marcin Andrychowicz?? , Stefan Dziembowski? ? ? , Daniel Malinowski† and Łukasz Mazurek‡ University of Warsaw Abstract. We show how the Bitcoin currency system (wit

    Add to Reading List

    Source URL: fc14.ifca.ai

    Language: English - Date: 2014-02-18 12:20:06
    462015 IEEE Symposium on Security and Privacy  Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

    2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

    Add to Reading List

    Source URL: diyhpl.us

    Language: English
    47Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts ∗ Ahmed Kosba

    Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts ∗ Ahmed Kosba

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-07-21 00:02:53
    48Deploying secure multi-party computation for financial data analysis (short paper)? Dan Bogdanov1,2 , Riivo Talviste1,2,3 , and Jan Willemson1,3 1  2

    Deploying secure multi-party computation for financial data analysis (short paper)? Dan Bogdanov1,2 , Riivo Talviste1,2,3 , and Jan Willemson1,3 1 2

    Add to Reading List

    Source URL: fc12.ifca.ai

    Language: English - Date: 2012-02-18 14:34:31
      49Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

      Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-09-12 00:27:33
      50Adaptively Secure Multi-party Computation Ran Canetti Uri Feigey  Oded Goldreichy

      Adaptively Secure Multi-party Computation Ran Canetti Uri Feigey Oded Goldreichy

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2014-06-22 06:30:49