New Frontiers in Secure Computation
نویسنده
چکیده
of the Dissertation New Frontiers in Secure Computation
منابع مشابه
Design and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملA new approach based on data envelopment analysis with double frontiers for ranking the discovered rules from data mining
Data envelopment analysis (DEA) is a relatively new data oriented approach to evaluate performance of a set of peer entities called decision-making units (DMUs) that convert multiple inputs into multiple outputs. Within a relative limited period, DEA has been converted into a strong quantitative and analytical tool to measure and evaluate performance. In an article written by Toloo et al. (2009...
متن کاملExploring the Limits of Common Coins Using Frontier Analysis of Protocols
In 2-party secure computation, access to common, trusted randomness is a fundamental primitive. It is widely employed in the setting of computationally bounded players (under various complexity assumptions) to great advantage. In this work we seek to understand the power of trusted randomness, primarily in the computationally unbounded (or information theoretic) setting. We show that a source o...
متن کاملFuzzy Efficiency Measures in DEA: A New Approach based on Fuzzy DEA Approach with Double Frontiers
Data envelopment analysis (DEA) is a method to measure relative efficiency of a set of decision-making units (DMUs) which uses multiple inputs and produces multiple outputs. In the conventional DEA, crisp inputs and outputs are fundamentally necessary. But the observed values of inputs and outputs in real-world problems are sometimes imprecise. Thus, performance measurement often needs to be do...
متن کاملSecure Computation on Mobile Devices
Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...
متن کامل