Sciweavers

64 search results - page 2 / 13
» Secure multi-party quantum computation
Sort
View
DGO
2004
114views Education» more  DGO 2004»
13 years 6 months ago
Regression on Distributed Databases via Secure Multi-Party Computation
Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerom...
EUROCRYPT
2008
Springer
13 years 6 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
IACR
2011
111views more  IACR 2011»
12 years 4 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
13 years 11 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
SAC
2009
ACM
13 years 11 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...