Sciweavers

621 search results - page 7 / 125
» Efficient Secure Multi-party Computation
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
ICALP
2010
Springer
13 years 11 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
EUROCRYPT
2007
Springer
14 years 1 months ago
Efficient Two-Party Secure Computation on Committed Inputs
Stanislaw Jarecki, Vitaly Shmatikov
ASIACRYPT
2000
Springer
14 years 1 months ago
Efficient Secure Multi-party Computation
Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
PROVSEC
2009
Springer
14 years 4 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang