Sciweavers

5476 search results - page 70 / 1096
» Resettably Secure Computation
Sort
View
145
Voted
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
148
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
143
Voted
EUROMICRO
2009
IEEE
15 years 7 months ago
Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes
Cloud computing uses virtualization technologies to offer a non-shared use rental of computer resources with publicly accessible worker nodes. However, unlike Grid computing, Cloud...
Matthias Schmidt, Niels Fallenbeck, Matthew Smith,...
131
Voted
CSREASAM
2006
15 years 5 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
128
Voted
FOCS
2006
IEEE
15 years 9 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...