[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhao et al., 2019 - Google Patents

Secure multi-party computation: theory, practice and applications

Zhao et al., 2019

Document ID
5625757049019318069
Author
Zhao C
Zhao S
Zhao M
Chen Z
Gao C
Li H
Tan Y
Publication year
Publication venue
Information Sciences

External Links

Snippet

Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that enables distributed parties to jointly compute an arbitrary functionality without revealing their own private inputs and outputs. Since Yao's seminal work in 1982, 30 years of research on …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Zhao et al. Secure multi-party computation: theory, practice and applications
Bonawitz et al. Practical secure aggregation for privacy-preserving machine learning
Goyal et al. Efficient two party and multi party computation against covert adversaries
Lin et al. OBFP: Optimized blockchain-based fair payment for outsourcing computations in cloud computing
CN110719159A (en) Multi-party privacy set intersection method for resisting malicious enemies
Liu et al. Privacy-preserving COVID-19 contact tracing solution based on blockchain
Chen et al. BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health records
Lyu et al. Towards fair and decentralized privacy-preserving deep learning with blockchain
Mohassel et al. Efficient server-aided 2pc for mobile phones
Xu et al. PPSEB: A Postquantum Public‐Key Searchable Encryption Scheme on Blockchain for E‐Healthcare Scenarios
Saleem et al. Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits
Li et al. Healthfort: A cloud-based ehealth system with conditional forward transparency and secure provenance via blockchain
Wu et al. Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Gowda et al. BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
Zhang et al. SmartAuction: A blockchain-based secure implementation of private data queries
Qin et al. A privacy-preserving blockchain-based tracing model for virus-infected people in cloud
Zuo et al. Privacy-preserving subgraph matching scheme with authentication in social networks
Homoliak et al. An air-gapped 2-factor authentication for smart-contract wallets
Liu et al. Secure three-party computational protocols for triangle area
Talviste Applying secure multi-party computation in practice
Zhao et al. Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
Yan et al. Offline/Online Outsourced Attribute‐Based Encryption with Partial Policy Hidden for the Internet of Things
Chen et al. Sphinx-in-the-head: group signatures from symmetric primitives
Li et al. Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts
Song et al. Enabling transparent deduplication and auditing for encrypted data in cloud