Sciweavers

150 search results - page 10 / 30
» Fair Secure Two-Party Computation
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
NOSSDAV
2009
Springer
14 years 1 days ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 9 months ago
Privacy-Preserving Singular Value Decomposition
Abstract-- In this paper, we propose secure protocols to perform Singular Value Decomposition (SVD) for two parties over horizontally and vertically partitioned data. We propose va...
Shuguo Han, Wee Keong Ng, Philip S. Yu
CIS
2004
Springer
14 years 27 days ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu
CRYPTO
2000
Springer
81views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch