Sciweavers

38 search results - page 3 / 8
» Scalar-product based Secure Two-party Computation
Sort
View
ASIACRYPT
2004
Springer
13 years 10 months ago
Practical Two-Party Computation Based on the Conditional Gate
Abstract. We present new results in the framework of secure multiparty computation based on homomorphic threshold cryptosystems. We introduce the conditional gate as a special type...
Berry Schoenmakers, Pim Tuyls
NDSS
2003
IEEE
13 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
NCA
2011
IEEE
13 years 7 days ago
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
ā€”Neural Networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties...
Ankur Bansal, Tingting Chen, Sheng Zhong
CCS
2011
ACM
12 years 5 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have signiļ¬cantly simpliļ¬ed the development of such protocols. On the other hand, ...
Florian Kerschbaum
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
13 years 12 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present eļ¬ƒcient protocols f...
Ayman Jarrous, Benny Pinkas