Sciweavers

310 search results - page 20 / 62
» An Efficient Protocol for Fair Secure Two-Party Computation
Sort
View
ICCS
2007
Springer
15 years 3 months ago
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
Kwonseung Shin, Min Young Chung, Hyunseung Choo
ACNS
2010
Springer
132views Cryptology» more  ACNS 2010»
15 years 29 days ago
Efficient Implementation of the Orlandi Protocol
Abstract. We present an efficient implementation of the Orlandi protocol which is the first implementation of a protocol for multiparty computation on arithmetic circuits, which is...
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Niel...
ISW
2010
Springer
14 years 7 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
ASIACRYPT
2007
Springer
15 years 1 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
15 years 1 months ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong