نتایج جستجو برای: secure computation

تعداد نتایج: 196509  

Journal: :E3S web of conferences 2023

A potent cryptographic mechanism called Secure Multi-Party Computation (SMPC) has evolved that allows numerous participants to work together and execute data analytic tasks while maintaining the privacy secrecy of their individual data. In several fields, like healthcare, finance, social sciences, where stakeholders must exchange evaluate sensitive information without disclosing it others, coll...

Journal: :Quantum Information & Computation 2021

Quantum conference is a process of securely exchanging messages between three or more parties, using quantum resources. A Measurement Device Independent Dialogue (MDI-QD) protocol, which secure against information leakage, has been proposed (Quantum Information Processing 16.12 (2017): 305) in 2017, proven to be insecure intercept-and-resend attack strategy. We first modify this protocol and ge...

Journal: :Journal of Privacy and Confidentiality 2009

Journal: :Lecture Notes in Computer Science 2021

We construct the first constant-round protocols for secure quantum computation in two-party (2PQC) and multi-party (MPQC) settings with security against malicious adversaries. Our are common random string (CRS) model.

2009
Moez Ben MBarka

Computation outsourcing is used when an entity needs to execute a task but does not have the appropriate computation power to perform it. In this paper, we will survey the approach of delegation: instead of doing the computation locally, the entity outsources it to one or more external helpers which have the appropriate resources. Although this can safely be done for most everyday life tasks, i...

Journal: :IACR Cryptology ePrint Archive 2002
Shafi Goldwasser Yehuda Lindell

It has recently been shown that executions of authenticated Byzantine Agreement protocols in which more than a third of the parties are corrupted, cannot be composed concurrently, in parallel, or even sequentially (where the latter is true for deterministic protocols). This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید