搜索结果: 1-15 共查到“军队指挥学 Secure Multi-Party Computation”相关记录38条 . 查询时间(0.151 秒)
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation
Secure Multi-Party Computation Verified Implementation High-Assurance Cryptography
2019/8/14
Secure Multi-Party Computation (MPC) enables a group of nn distrusting parties to jointly compute a function using private inputs. MPC guarantees correctness of computation and confidentiality of inpu...
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
cryptographic protocols SMC
2019/6/26
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
cryptographic protocols secret sharing
2019/6/19
Secure multi-party computation permits evaluation of any desired functionality on private data without disclosing the data to the participants and is gaining its popularity due to increasing collectio...
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
Multi-party computation secure function evaluation logic synthesis
2019/3/13
Secure Multi-party Computation (MPC) is one of the most influential achievements of modern cryptography: it allows evaluation of an arbitrary function on private inputs from multiple parties without r...
BeeHive: Double Non-interactive Secure Multi-party Computation
Secure multi-party computation secret sharing non-interactive
2018/8/16
Currently, round complexity and communication complexity are two fundamental issues of secure multi-party computation (MPC) since all known schemes require communication for each multiplication operat...
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
cryptographic protocols Certified Inputs
2018/8/16
The motivation for this work comes from the need to strengthen security of secure multi-party protocols with the ability to guarantee that the participants provide their truthful inputs in the computa...
Secure Multi-Party Computation from Strongly Uniform Key Agreement
MPC maliciously secure OT LPN
2018/5/28
We give a construction of a secure multi-party computation (MPC) protocol from a special type of key agreement, where the distribution of the messages sent by one of the parties is computationally clo...
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
Cryptography Protocols Multi-Party Computation
2018/5/22
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it...
Round-Optimal Secure Multi-Party Computation
Secure Multi-Party Computation Garbled Circuits Round Complexity
2017/11/1
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should ho...
Secure Multi-Party Computation in Large Networks
Secure multi-party computation Secret sharing Information-theoretic security
2017/10/16
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a significant number of parties. We consider both the synchronous and the asynchronous communication m...
The Price of Low Communication in Secure Multi-Party Computation
Secure multi-party computation Oblivious Transfer adversary structures
2017/6/6
Traditional protocols for secure multi-party computation (MPC) among nn parties that achieve optimal resiliency communicate at least a linear (in nn) number of bits. In this work we investigate the fe...
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
multi-party computation block cipher implementation
2017/5/2
We present an actively secure protocol for secure multi-party computation based on lookup tables, by extending the recent, two-party `TinyTable' protocol of Damgard et al. (ePrint 2016). Like TinyTabl...
Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation
multi-party computation secure computation garbled circuits
2017/3/6
In this paper, we extend the recent work by Wang et al., who proposed a new framework for secure two-party computation in the preprocessing model that can be instantiated efficiently using TinyOT. We ...
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Secure multi-party computation Financial cryptography Mobile commerce mechanism
2016/12/29
The basic objective of this work is to construct an efficient and secure mechanism for mobile
commerce applying the concept of financial cryptography and secure multi-party computation. The
mechanis...
Publicly Auditable Secure Multi-Party Computation
Efficient Multi-Party Computation Public Verifiability Electronic Voting
2016/1/26
In the last few years the efficiency of secure multi-party computation (MPC) increased in
several orders of magnitudes. However, this alone might not be enough if we want MPC protocols to be
used in...