Sciweavers

92 search results - page 2 / 19
» Secure Two-party Protocols for Point Inclusion Problem
Sort
View
83
Voted
CORR
2007
Springer
74views Education» more  CORR 2007»
14 years 10 months ago
Secure Two-party Protocols for Point Inclusion Problem
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the re...
Tony Thomas
ISI
2005
Springer
15 years 3 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
87
Voted
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
15 years 3 months ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
64
Voted
CTRSA
2006
Springer
90views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Fair Identification
This paper studies a new problem called fair identification: given two parties, how should they identify each other in a fair manner. More precisely, if both parties are honest the...
Omkant Pandey, Julien Cathalo, Jean-Jacques Quisqu...
91
Voted
CCS
2011
ACM
13 years 10 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum