Sciweavers

150 search results - page 14 / 30
» Fair Secure Two-Party Computation
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Optimistic Fair Exchange with Multiple Arbiters
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has something that Bob wants, and Bob has something that Alice wants. A fair exchang...
Alptekin Küpçü, Anna Lysyanskaya
PODC
2004
ACM
14 years 28 days ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...
SDM
2004
SIAM
242views Data Mining» more  SDM 2004»
13 years 8 months ago
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analy...
Wenliang Du, Yunghsiang S. Han, Shigang Chen
IPPS
2005
IEEE
14 years 1 months ago
GridIS: An Incentive-Based Grid Scheduling
In a grid computing environment, resources are autonomous, wide-area distributed, and what’s more, they are usually not free. These unique characteristics make scheduling in a s...
Lijuan Xiao, Yanmin Zhu, Lionel M. Ni, Zhiwei Xu
TCOS
2010
13 years 2 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan