• No results found

Secure Multiparty Computation

Non-Interactive  Secure  Multiparty  Computation

Non-Interactive Secure Multiparty Computation

... Keywords: secure multiparty computation, obfuscation, private simultaneous messages protocols, ran- domized encoding of functions, garbling schemes, multi-input functional ...non-interactive ...

43

Secure  Multiparty  Computation  with  Partial  Fairness

Secure Multiparty Computation with Partial Fairness

... of secure multiparty computation that is more stringent than standard definitions of secure computation with ...for secure computation as given by Aumann and Lindell ...

28

On  the  Message  Complexity  of  Secure  Multiparty  Computation

On the Message Complexity of Secure Multiparty Computation

... We study the minimal number of point-to-point messages required for general secure multiparty computation (MPC) in the setting of computational security against semi-honest, static adver[r] ...

16

Secure Multiparty Computation from SGX

Secure Multiparty Computation from SGX

... general secure multiparty computation (MPC) ...bootstrap secure communications between participants and the ...for secure computation for arbitrary functionalities; ...

39

A feasibility analysis of secure multiparty computation deployments

A feasibility analysis of secure multiparty computation deployments

... Imagine a scenario where multiple companies hold valuable information and they want to combine their data for analysis that would benefit them all. In an honest world, the companies could do just that—combine their data. ...

59

Asynchronous  Secure  Multiparty  Computation  in  Constant  Time

Asynchronous Secure Multiparty Computation in Constant Time

... of secure multiparty computation, a set of mutually distrusting parties wish to jointly and securely compute a function of their ...This computation should be such that each party receives its ...

24

A Feasibility Analysis of Secure Multiparty Computation Deployments

A Feasibility Analysis of Secure Multiparty Computation Deployments

... 1 Introduction 1.1 Problem statement Imagine a scenario where multiple companies hold valuable information and they want to combine their data for analysis that would benefit them all. In an honest world, the companies ...

52

Efficient Secure Multiparty Computation with Identifiable Abort

Efficient Secure Multiparty Computation with Identifiable Abort

... study secure multiparty computation (MPC) in the dis- honest majority setting providing security with identifiable abort, where if the protocol aborts, the honest parties can agree upon the identity ...

30

Privacy Preserving Fuzzy Modeling for Secure Multiparty Computation

Privacy Preserving Fuzzy Modeling for Secure Multiparty Computation

... of computation is very high. Therefore, studies on secure computation using shared data are made to avoid secure risks being abused or leaked and to reduce computing ...The secure ...

6

On  Achieving  the ''Best  of  Both  Worlds''  in  Secure  Multiparty  Computation

On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation

... Two settings are typically considered for secure multiparty computation, depending on whether or not a majority of the parties are assumed to be honest. Protocols designed un- der this assumption ...

21

Secure  Multiparty  Computation  for  Privacy-Preserving  Data  Mining

Secure Multiparty Computation for Privacy-Preserving Data Mining

... 2 Secure Multiparty Computation – Background and Definitions ...joint computation of some ...of secure multiparty computation is to enable parties to carry out such ...

39

Round  Efficient  Unconditionally  Secure  Multiparty  Computation  Protocol

Round Efficient Unconditionally Secure Multiparty Computation Protocol

... of multiparty computation protocols are communi- cation complexity and round ...of secure multiparty computation protocols are of fundamental theoretical ...of multiparty ...

18

On  Achieving  the "Best  of  Both  Worlds"  in  Secure  Multiparty  Computation

On Achieving the "Best of Both Worlds" in Secure Multiparty Computation

... Abstract Two settings are traditionally considered for secure multiparty computation, depending on whether or not a majority of the parties are assumed to be honest. Protocols designed un- der this ...

23

Secure Multiparty Computation between Distrusted Networks Terminals

Secure Multiparty Computation between Distrusted Networks Terminals

... called secure multiparty computation (SMC) is the study of such distributed computation protocols that allow distrusted parties to perform joint computation without disclosing private ...

10

Near-Linear  Unconditionally-Secure  Multiparty  Computation  with  a  Dishonest  Minority

Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority

... In secure multiparty computation (MPC), a set of n players wish to evaluate an arbitrary but fixed function F on private ...the computation is correct, even in the presence of an adversary ...

21

SecurePL: a compiler and toolbox for practical and easy secure multiparty computation

SecurePL: a compiler and toolbox for practical and easy secure multiparty computation

... cryptography secure multiparty computation was first suggested as a problem in a paper by Andrew ...based secure multi- party computation methods, algebraic operations could be done ...

64

Privacy Preserving Q-learning in the Analog Model for Secure Multiparty Computation

Privacy Preserving Q-learning in the Analog Model for Secure Multiparty Computation

... for Secure Multiparty Computation Hirofumi Miyajima † 1 , Noritaka Shigei † 2 , Hiromi Miyajima † 3 and Norio Shiratori † 4 Abstract—Many studies have been done with the security of cloud ...with ...

6

Topics in IT Security Secure Multiparty Computation

Topics in IT Security Secure Multiparty Computation

... A simulator in the ideal world, who does not know the inputs of the honest players, can present messages of a real world protocol to corrupted players.. Corrupted players cannot distingu[r] ...

34

On  the  Necessity  of  Rewinding  in  Secure  Multiparty  Computation

On the Necessity of Rewinding in Secure Multiparty Computation

... We address this case by explicitly stating whether the simulator is efficient or inefficient in the respective theorems.) A more detailed exposition of the stand-alone model can be found in [5, Chapter 7]. Concurrent ...

15

CiteSeerX — Studies in Secure Multiparty Computation and Applications

CiteSeerX — Studies in Secure Multiparty Computation and Applications

... Problems with proving adaptive security. When adaptive adversaries are considered, the construction of a simulator ~ S in the computational setting encounters the following problem which is a more severe version of the ...

153

Show all 10000 documents...

Related subjects