Secure multi-party computation

Results: 221



#Item
61Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-04 05:09:56
62Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-07-21 08:57:56
63Bitcoin / Peer-to-peer computing / Secure multi-party computation / Two-phase commit protocol / Proof-of-work system / IP / SHA-2 / Cryptography / Software / Computing

Fairness with Penalties Delegated Computation Multiparty Fair Exchange

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-11-14 17:50:41
64Peer-to-peer / Internet privacy / Scalability / Database / Secure multi-party computation / Boolean circuit / Theoretical computer science / Computing / Applied mathematics

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. Privacy Preserving Group Nearest Neighbour Queries in

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-12 14:35:10
65Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
66Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
67Computing / Financial cryptography / Electronic commerce / Payment systems / Electronic money / Secure multi-party computation / Proof-of-work system / Business / Technology / Cryptographic protocols / Bitcoin / Peer-to-peer computing

Fairness with Penalties Secure Cash Distribution End

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2015-01-09 03:46:48
68Data privacy / Differential privacy / Secure multi-party computation / Privacy / Internet privacy / Information privacy / Entropy / Secret sharing / Data mining / Cryptography / Cryptographic protocols / Formal sciences

Poster: Differentially Private Decision Tree Learning from Distributed Data Parisa Kaghazgaran Hassan Takabi

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:26
69Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
70Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
UPDATE