搜索结果: 1-15 共查到“军事学 multi-party”相关记录106条 . 查询时间(0.171 秒)
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
font style='font-size:12px;'>
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Fairness and Guaranteed Output Delivery MPC Round Complexity
font style='font-size:12px;'>
2019/9/5
Two of the most sought-after properties of Multi-party Computation (MPC) protocols are fairness and guaranteed output delivery (GOD), the latter also referred to as robustness. Achieving both, however...
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation
Secure Multi-Party Computation Verified Implementation High-Assurance Cryptography
font style='font-size:12px;'>
2019/8/14
Secure Multi-Party Computation (MPC) enables a group of nn distrusting parties to jointly compute a function using private inputs. MPC guarantees correctness of computation and confidentiality of inpu...
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
cryptographic protocols SMC
font style='font-size:12px;'>
2019/6/26
Classification of personal text messages has many useful applications in surveillance, e-commerce, and mental health care, to name a few. Giving applications access to personal texts can easily lead t...
Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority
cryptographic protocols secret sharing
font style='font-size:12px;'>
2019/6/19
Secure multi-party computation permits evaluation of any desired functionality on private data without disclosing the data to the participants and is gaining its popularity due to increasing collectio...
Multi-Party PSM, Revisited
cryptographic protocols information-theoretic
font style='font-size:12px;'>
2019/6/4
Private Simultaneous Messages (PSM) is a minimal model for information-theoretic non-interactive multi-party computation. In the 2-party case, Beimel et al. showed every function f:[N]×[N]→{0,1}f:[N]×...
Multi-Party Virtual State Channels
blockchain state channel network off-chain protocol
font style='font-size:12px;'>
2019/5/28
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurren...
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
Multi-party computation secure function evaluation logic synthesis
font style='font-size:12px;'>
2019/3/13
Secure Multi-party Computation (MPC) is one of the most influential achievements of modern cryptography: it allows evaluation of an arbitrary function on private inputs from multiple parties without r...
Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation
information theoretic multi-party computation oblivious linear evaluation
font style='font-size:12px;'>
2019/1/2
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an evaluation of a sender's private, degree 11 polynomial, without letting the sender learn the evaluation p...
Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic
cryptographic protocols RAM
font style='font-size:12px;'>
2019/1/2
In this work, we study the problem of constructing oblivious RAM for secure multi-party computation to obliviously access memory at private locations during secure computation. We build on recent two-...
Multi-party Poisoning through Generalized $p$-Tampering
Biasing Coin-Tossing Poisoning
font style='font-size:12px;'>
2018/11/15
In a poisoning attack against a learning algorithm, an adversary tampers with a fraction of the training data T with the goal of increasing the classification error of the constructed hypothesis/model...
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
coin toss coin flip
font style='font-size:12px;'>
2018/11/12
Coin toss has been extensively studied in the cryptography literature, and the well-accepted notion of fairness (henceforth called strong fairness) requires that a corrupt coalition cannot cause non-n...
BeeHive: Double Non-interactive Secure Multi-party Computation
Secure multi-party computation secret sharing non-interactive
font style='font-size:12px;'>
2018/8/16
Currently, round complexity and communication complexity are two fundamental issues of secure multi-party computation (MPC) since all known schemes require communication for each multiplication operat...
Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs
cryptographic protocols Certified Inputs
font style='font-size:12px;'>
2018/8/16
The motivation for this work comes from the need to strengthen security of secure multi-party protocols with the ability to guarantee that the participants provide their truthful inputs in the computa...
Function-Dependent Commitments for Verifiable Multi-Party Computation
Commitments Homomorphic Cryptography Verifiable Computation
font style='font-size:12px;'>
2018/7/9
In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. Existing solutions do not simultaneously provide fast correctness verif...