Sciweavers

621 search results - page 2 / 125
» Efficient Secure Multi-party Computation
Sort
View
IACR
2011
104views more  IACR 2011»
12 years 5 months ago
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit o...
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, ...
DGO
2004
114views Education» more  DGO 2004»
13 years 6 months ago
Regression on Distributed Databases via Secure Multi-Party Computation
Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerom...
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
IACR
2011
111views more  IACR 2011»
12 years 5 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
13 years 12 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan