نتایج جستجو برای: secure computation

تعداد نتایج: 196509  

2016
Mor Weiss Yuval Ishai Amit Sahai Michael Viderman

1

2011
Oleg Šelajev

Secure two-party computation problem is about two parties that want to compute some function of their private inputs in a way that other party won’t learn it. We describe a general way to perform secure two-party computation of a function specified as a boolean circuit, which was proposed by A.A. Yao in 1982. This method is named Yao garbled circuit evaluation and is secure against semi-honest ...

2002
Ronald Cramer Ivan Damg̊ard

These lecture notes introduce the notion of secure multiparty computation. We introduce some concepts necessary to define what it means for a multiparty protocol to be secure, and survey some known general results that describe when secure multiparty computation is possible. We then look at some general techniques for building secure multiparty protocols, including protocols for commitment and ...

2016
Daniel Genkin Antigoni Polychroniadou Yuval Ishai Manoj M. Prabhakaran Amit Sahai

1 I Side Channel Attacks 3

2012
Mentari Djatmiko Mathieu Cunche Roksana Boreli Aruna Seneviratne

The increased processing power and storage capacity of inhome and mobile computing devices has motivated their inclusion in distributed and cloud computing systems. The resulting diverse environment creates a strong requirement for secure computations, which can be realised by Secure Multi-Party Computation (MPC). However, MPC most commonly assumes that parties performing the secure computation...

2016
Raad Bahmani Manuel Barbosa Ferdinand Brasser Bernardo Portela Ahmad-Reza Sadeghi Guillaume Scerri Bogdan Warinschi

Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a malicious operating system; it also permits a remote user to obtain strong interactive attestation guarantees on both the code running in an IEE and its input/output behaviour. In this paper we sh...

2011
Yuval Ishai Eyal Kushilevitz Rafail Ostrovsky Manoj Prabhakaran Amit Sahai

Suppose that a receiver R wishes to publish an encryption of her secret input x so that every sender S, holding an input y, can reveal f(x, y) to R by sending her a single message. This should be done while simultaneously protecting the secrecy of y against a corrupted R and preventing a corrupted S from having an unfair influence on the output of R beyond what is allowed by f . When the partie...

Journal: :CoRR 2015
Christopher Meiklejohn

Eventual consistency is a more natural model than strong consistency for a distributed system, since it is closer to the underlying physical reality. Therefore, we propose that it is important to find a programming model that is both congenial to developers and supports eventual consistency. In particular, we consider that a crucial test for such a model is that it should support edge computati...

2003
Benny Pinkas

We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any substantial advantage by terminating the protocol prematurely. The transformation adds additional steps before and after the execution of the original protocol, but does not change it otherwise, and does not use a trusted third party. It is based on the use of g...

2009
Peter Bogetoft Dan Lund Christensen Ivan Damgård Martin Geisler Thomas P. Jakobsen Mikkel Krøigaard Janus Dam Nielsen Jesper Buus Nielsen Kurt Nielsen Jakob Illeborg Pagter Michael I. Schwartzbach Tomas Toft

In this note, we report on the first large-scale and practical application of multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید