Privacy-Preserving Fully Online Matching with Deadlines
Abstract
References
Index Terms
- Privacy-Preserving Fully Online Matching with Deadlines
Recommendations
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation
CODASPY '23: Proceedings of the Thirteenth ACM Conference on Data and Application Security and PrivacyIn secure multi-party computation (SMPC), it is considered that multiple parties that are known to each other evaluate a function over their private inputs in a secure fashion. The participating parties do not learn anything about each other's private ...
Towards Secure Evaluation of Online Functionalities
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and SecurityTo date, ideal functionalities securely realized with secure multi-party computation (SMPC) mainly considers functions of the private input of a fixed number of a priori known parties. In this paper, we generalize these definitions such that protocols ...
Estimating the Runtime and Global Network Traffic of SMPC Protocols
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacySecure multi-party computation (SMPC) enables multiple parties to evaluate functions of their private inputs, in a way such that none of the parties can learn anything about the other parties' private input but what can be learned from their own input ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Mohamed Shehab,
- Program Chairs:
- Maribel Fernandez,
- Ninghui Li
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 117Total Downloads
- Downloads (Last 12 months)41
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in