Sciweavers

1923 search results - page 10 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
14 years 8 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
FSTTCS
2009
Springer
14 years 3 months ago
Non-Local Box Complexity and Secure Function Evaluation
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...
ICDCN
2010
Springer
14 years 13 days ago
On Communication Complexity of Secure Message Transmission in Directed Networks
Abstract. We re-visit the problem of perfectly secure message transmission (PSMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbou...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
14 years 6 hour ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
EUROPAR
2008
Springer
13 years 10 months ago
Towards a Security Model to Bridge Internet Desktop Grids and Service Grids
Gabriel Caillat, Oleg Lodygensky, Etienne Urbah, G...