Secure two-party computation

Results: 88



#Item
51Secure multi-party computation / Homomorphic encryption / Computational complexity theory / Computing / Boolean circuit / Circuit / Mathematics / Verifiable computing / Secure two-party computation / Cryptographic protocols / Cryptography / Applied mathematics

Computing on Encrypted Data Secure Internet of Things Seminar David Wu January, 2015 New Applications in the Internet of Things

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-01-12 23:28:56
52Computing / Communications protocol / Secure two-party computation / X Window System / Universal composability / Cryptographic protocols / Data / Information

Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canetti† July 16, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-16 22:00:04
53Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation

Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-20 09:14:45
54Universal composability / Zero-knowledge proof / Secure two-party computation / Communications protocol / Commitment scheme / Actor model / Proof of knowledge / IP / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell∗ Department of Computer Science Bar-Ilan University Ramat Gan, 52900, Israel

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2006-10-01 16:24:33
55Key management / Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Certificate authority / Universal composability / Cryptography / Cryptographic protocols / Public-key cryptography

Legally Enforceable Fairness in Secure Two-Party Computation∗ Yehuda Lindell† Department of Computer Science Bar-Ilan University, Israel.

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2009-07-16 07:03:28
56Secure multi-party computation / Secure two-party computation / Cheque / Digital signature / Standard model / Random oracle / Cryptography / Cryptographic protocols / Public-key cryptography

Legally Enforceable Fairness in Secure Two-Party Computation

Add to Reading List

Source URL: cjtcs.cs.uchicago.edu

Language: English - Date: 2011-07-07 17:00:19
57Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
58Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
59Secure two-party computation / Function / Inverse function / Universal composability / Cryptographic protocols / Mathematics / Secure multi-party computation

Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions Gilad Asharov∗ Amos Beimel†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 05:22:34
60Secure two-party computation / Public-key cryptography / Oblivious transfer / Commitment scheme / Cryptography / Cryptographic protocols / Universal composability

Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-15 13:34:55
UPDATE