Sciweavers

5484 search results - page 4 / 1097
» Almost-Everywhere Secure Computation
Sort
View
SMILE
2000
Springer
14 years 1 months ago
A Progressive Scheme for Stereo Matching
Brute-forcedensematchingisusuallynotsatisfactorybecausethesame search range is used for the entire image, yielding potentially many false matches. In this paper, we propose a progr...
Zhengyou Zhang, Ying Shan
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
CCS
2011
ACM
12 years 9 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
CCS
2011
ACM
12 years 9 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
12 years 7 days ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee