Sciweavers

546 search results - page 19 / 110
» On the Power of Secure Two-Party Computation
Sort
View
CARDIS
2010
Springer
168views Hardware» more  CARDIS 2010»
15 years 4 months ago
Secure Delegation of Elliptic-Curve Pairing
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A computationally limited device (typically a smart-card) will delegate the computa...
Benoît Chevallier-Mames, Jean-Sébasti...
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 1 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
FOCS
2006
IEEE
15 years 3 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
EGC
2005
Springer
15 years 3 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj