Secure multi-party computation

Results: 221



#Item
71RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
72Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-09-01 09:06:37
73Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
74Business / Auction / Secure multi-party computation / Trusted third party / Universal composability / Vickrey auction / Online auction business model / Bid / Cryptography / Auction theory / Auctioneering / Cryptographic protocols

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
75Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
76Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
77Secure multi-party computation / Secure two-party computation / PP / Function / Universal composability / Cryptographic protocols / Mathematics / Applied mathematics

Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay† Jonathan Katz‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:31:04
78Cryptography / Identification / Surveillance / Fingerprint recognition / Fingerprint / Public key fingerprint / Secure multi-party computation / Minutiae / Fingerprint Verification Competition / Fingerprints / Biometrics / Security

Poster: Secure Computation of Fingerprint Alignment and Matching Fattaneh Bayatbabolghani and Marina Blanton Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN, USA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
79

BRICS Basic Research in Computer Science BRICS RSCramer et al.: Span Programs and General Secure Multi-Party Computation Span Programs and General

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1997-11-25 08:24:32
    80

    Adaptively Secure UC Constant Round Multi-Party Computation Ivan Damg˚ ard1 , Antigoni Polychroniadou1 , and Vanishree Rao2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-11-05 09:16:53
      UPDATE