Secure two-party computation

Results: 88



#Item
11MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
12Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2

Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
13Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-06-24 16:43:48
14Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

Add to Reading List

Source URL: work.debayangupta.com

Language: English - Date: 2016-01-22 16:19:24
15Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum1 , Thomas Schneider2 , and Axel Schr¨opfer1 1 SAP AG {florian.kerschbaum,axel.schroepfer}@sap.com

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2014-05-12 11:51:10
16Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡  Martin J. Straussk

Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2006-09-25 10:55:42
17Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Automatic Protocol Selection in Secure Two-Party Computations Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-03-24 11:27:34
18Fair Two-Party Computations via Bitcoin Deposits? Marcin Andrychowicz?? , Stefan Dziembowski? ? ? , Daniel Malinowski† and Łukasz Mazurek‡ University of Warsaw  Abstract. We show how the Bitcoin currency system (wit

Fair Two-Party Computations via Bitcoin Deposits? Marcin Andrychowicz?? , Stefan Dziembowski? ? ? , Daniel Malinowski† and Łukasz Mazurek‡ University of Warsaw Abstract. We show how the Bitcoin currency system (wit

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:06
19Efficiently Making Secure Two-Party Computation Fair Handan Kılın¸c1 and Alptekin K¨ up¸cu ¨2 1

Efficiently Making Secure Two-Party Computation Fair Handan Kılın¸c1 and Alptekin K¨ up¸cu ¨2 1

Add to Reading List

Source URL: fc16.ifca.ai

Language: English - Date: 2016-02-08 20:23:34
    20Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

    Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique∗ (Technical report – September 11, 2013) Luís T. A. N. Brandão† University of Lisbon

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-09-12 00:27:33