Secure two-party computation

Results: 88



#Item
71Oblivious transfer / Secure multi-party computation / Decisional Diffie–Hellman assumption / ElGamal encryption / XTR / IP / Degree of a polynomial / Proof of knowledge / Cryptography / Cryptographic protocols / Polynomials

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay∗ Abstract In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-03 11:03:18
72Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
73Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-10 15:06:54
74Cryptographic protocols / Computational complexity theory / Secure multi-party computation / Circuit / Boolean circuit / Secure two-party computation / Communications protocol / Two-phase commit protocol / Theoretical computer science / Data / Information

Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings∗ Yehuda Lindell† Ben Riva†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 03:49:35
75Universal composability / Computing / Secure multi-party computation / Secure two-party computation / Communications protocol / Universal Turing machine / Cryptography / Turing machine / Cryptographic protocols / Data / Information

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation Ran Canetti∗ Asaf Cohen†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:39:30
76Information / Security token / Universal composability / Communications protocol / Secure two-party computation / Public-key cryptography / Access token / Cryptography / Cryptographic protocols / Data

HL08_set_intersection.graffle

Add to Reading List

Source URL: thomaschneider.de

Language: English - Date: 2014-06-13 11:49:34
77Information / Secure multi-party computation / Oblivious transfer / Secure two-party computation / Communications protocol / Lookup table / Transmission Control Protocol / Zero-knowledge proof / One-way function / Cryptographic protocols / Data / Computing

Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-01-09 00:12:19
78Secure two-party computation / Communication complexity / Oblivious transfer / IP / Communications protocol / Public-key cryptography / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:01
79Computing / Secure multi-party computation / Secure two-party computation / Pseudorandom generator / Circuit / Boolean circuit / Transmission Control Protocol / Computer / Actor model / Cryptographic protocols / Theoretical computer science / Applied mathematics

FairplayMP – A System for Secure Multi-Party Computation Assaf Ben-David∗ Noam Nisan∗ Benny Pinkas†

Add to Reading List

Source URL: www.cs.huji.ac.il

Language: English - Date: 2008-09-03 07:33:47
80Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation

Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2009-04-09 09:23:00
UPDATE