Sciweavers

162 search results - page 5 / 33
» Outsourcing Multi-Party Computation
Sort
View
SAC
2009
ACM
14 years 4 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...
WPES
2003
ACM
14 years 3 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
CSE
2009
IEEE
14 years 1 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
CSE
2009
IEEE
13 years 10 months ago
Integrity Verification of Outsourced XML Databases
Recent years have witnessed an increasing trend of enterprises outsource their IT services to third parties. A major concern in database outsourcing paradigm is integrity verificat...
Ruilin Liu, Hui Wang