Secure multi-party computation

Results: 221



#Item
81Payment systems / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Electronic money / Public-key cryptography / Mental poker / PayPal / Cryptography / Cryptographic protocols / Electronic commerce

Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
82Abstract data types / Electronic engineering / Stack / Computational complexity theory / Circuit / Electronic circuit / Secure multi-party computation / Boolean circuit / Lookup table / Computing / Theoretical computer science / Electronics

2013 IEEE Symposium on Security and Privacy Circuit Structures for Improving Efficiency of Security and Privacy Tools Samee Zahur and David Evans University of Virginia [samee, evans]@virginia.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:51
83Homomorphic encryption / Internet privacy / Privacy / Cloud computing / Paillier cryptosystem / Secure multi-party computation / Software agent / Information privacy / Email / Cryptography / Public-key cryptography / Cryptographic protocols

A Privacy-Preserving Cloud Computing System for Creating Participatory Noise Maps

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:22
84Secret sharing / Secure two-party computation / RSA / XTR / Transmission Control Protocol / Public-key cryptography / Privacy / Cryptography / Cryptographic protocols / Secure multi-party computation

Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2012-12-31 05:19:12
85XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-04-12 11:39:28
86Biometrics / Information / Lookup table / Computing / Security / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2015-01-19 06:59:50
87Cryptographic protocols / Permutations / Abstract algebra / Random permutation / Combination / Secure multi-party computation / Secret sharing / Cryptography / Mathematics / Combinatorics

Microsoft Word - RandomOrder1-working.doc

Add to Reading List

Source URL: dataprivacylab.org

Language: English - Date: 2013-10-01 06:58:24
88Bootstrapping / Secure multi-party computation / Cyberwarfare / Encryption / Security / Secrecy / Cryptography / Homomorphic encryption / Ciphertext

Bootstrapping BGV ciphertexts with a wider choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel Smart Department of Computer Science University of Bristol

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:31:46
89Secure multi-party computation / Circuit complexity / Circuit / Lookup table / Boolean circuit / Advantage / Randomized algorithm / Blinding / Field-programmable gate array / Theoretical computer science / Applied mathematics / Computational complexity theory

Small, Stupid, and Scalable: Secure Computing with Faerieplay∗ Alexander Iliev Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:14
90Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
UPDATE