• No results found

[PDF] Top 20 Secure Physical Computation using Disposable Circuits

Has 10000 "Secure Physical Computation using Disposable Circuits" found on our website. Below are the top 20 most common "Secure Physical Computation using Disposable Circuits".

Secure  Physical  Computation  using  Disposable  Circuits

Secure Physical Computation using Disposable Circuits

... of disposable circuits is an extension of the standard stateful tamper-proof token model, which was first formalized by Katz ...specific physical input held by another ...identifiable physical ... See full document

16

Secure  Computation  with  Constant  Communication  Overhead  using  Multiplication  Embeddings

Secure Computation with Constant Communication Overhead using Multiplication Embeddings

... multi-party computation [GMW87, Yao82] (MPC) allows mutually distrusting parties to compute securely over their private ...or physical resources like noisy channels [BMM99, CK88, Kil91, Kil00], correlated ... See full document

27

Pushing  the  Communication  Barrier  in  Secure  Computation  using  Lookup  Tables

Pushing the Communication Barrier in Secure Computation using Lookup Tables

... of secure computation requires radical engineering and ...LUT circuits to map them to multi- output LUT ...LUT using ABC. The generated circuits are then post- processed and layered ... See full document

25

Quantum computation with Majorana modes in superconducting circuits

Quantum computation with Majorana modes in superconducting circuits

... achieved using simple circuit elements such as capacitors and Josephson junctions, and thus arrive at a new concrete design for the experimental implementation of a fault-tolerant quantum ...fundamental ... See full document

217

Secure  Computation  using  Leaky  Correlations (Asymptotically  Optimal  Constructions)

Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)

... the secure computation of only sub-linear size ...2-message secure compu- tation protocol for 2-party functionalities that have Θ(n) circuit-size despite Θ(n)-bits of leakage, a qualitatively optimal ... See full document

42

Verified  Implementations  for  Secure   and  Verifiable  Computation

Verified Implementations for Secure and Verifiable Computation

... for secure and verifiable computation over encrypted ...garbled circuits set forth by Bellare, Hoang, and Rogaway (CCS 2012, ASIACRYPT 2012) to build verified im- plementations of garbling schemes, a ... See full document

13

Faster  Secure  Arithmetic  Computation  Using  Switchable  Homomorphic  Encryption

Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption

... Secure computation on encrypted data stored on untrusted clouds is an important ...Existing secure arithmetic computation techniques, such as fully homomorphic encryption (FHE) and somewhat ... See full document

25

Robust  Pseudorandom  Generators

Robust Pseudorandom Generators

... private circuits would immediate yield a corresponding improvement to Corollary ...private circuits which receive encoded inputs and produce encoded outputs, the results apply also to an alternative variant ... See full document

31

Privately  Evaluating  Decision  Trees   and  Random  Forests

Privately Evaluating Decision Trees and Random Forests

... level using the parameters in ...the computation and total communication between the client and the ...two-party secure computation protocol based on Yao’s garbled circuits [63, 53] for ... See full document

35

Circuits  Resilient  to  Additive  Attacks  with  Applications  to  Secure  Computation

Circuits Resilient to Additive Attacks with Applications to Secure Computation

... the circuits worked on the same ...of circuits ( C, D) that is a 2 b −σ -correct implementation of a circuit C : F n → F k such that the size of D is poly(σ, k, log | F |, log n) we will use almost ... See full document

93

Maturity   and  Performance  of  Programmable  Secure  Computation

Maturity and Performance of Programmable Secure Computation

... today’s secure computing ...programmable secure computation that we analyse in this ...garbled circuits and linear secret ...different secure computation artifacts based on ... See full document

26

EzPC:  Programmable,  Efficient,   and  Scalable  Secure  Two-Party  Computation  for  Machine  Learning

EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning

... Fairplay’s Secure Function Definition Language (SFDL) [5, 41] and CBMC-GC [29] compile C or Pascal like programs into boolean circuits that are then evaluated using garbled circuits ... See full document

15

Constant-Overhead  Secure  Computation  of  Boolean  Circuits  using  Preprocessing

Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing

... multiparty computation, a set of players each holding a private input wish to compute an agreed function such that the intended result is the only new information that is ... See full document

23

iDASH  Secure  Genome  Analysis  Competition  Using  ObliVM

iDASH Secure Genome Analysis Competition Using ObliVM

... manually using oblivious merge, one built with compiler using oblivious merge, one built manually using bloom filter, and one built using ... See full document

10

Physical Limits of Computation

Physical Limits of Computation

... of physical limits for computation. We are using some statements on base of min energy/bit, power delay prod- uct, Shannon entropy and Heisenberg uncertainty principle which result in about kTln(2) ... See full document

5

Privacy Preserving Record Linkage using LSH Blocking Approach and Secure Multiparty Computation with Set Intersection Technique

Privacy Preserving Record Linkage using LSH Blocking Approach and Secure Multiparty Computation with Set Intersection Technique

... In paper [2] they give a many-to-many information linkage as well as it is used to perform link in matching entities of different types. The internal node comprises of features from the one data set. The leaves of the ... See full document

5

Application, Computation, and Theory for Synthetic Gene Circuits

Application, Computation, and Theory for Synthetic Gene Circuits

... biological circuits because often many species can be measured simultaneously in steady state population snapshot measurements, but only a few species can be measured simultaneously in time series ... See full document

129

Students   and  Taxes:  a  Privacy-Preserving  Social  Study  Using  Secure  Computation

Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation

... The vigilance we encountered during the validation of a new privacy technol- ogy is natural. Previous attempts at bringing cryptographic secure computing into practice (e.g., when Feigenbaum et al. attempted to ... See full document

31

Secure  Distributed  Computation  on  Private  Inputs

Secure Distributed Computation on Private Inputs

... first part might compromise the security. This is the reason which the latter should only be decrypted if the former is different from 1. Note also that the third component of the ciphertext is not used in the decryption ... See full document

9

SCORAM:  Oblivious  RAM  for  Secure  Computation

SCORAM: Oblivious RAM for Secure Computation

... Since the client-side computational logic needs to process secret values (e.g., the original index), their cost cannot be ignored as in traditional ORAMs designed merely for out- sourcing storage. On the contrary, the ... See full document

12

Show all 10000 documents...