نتایج جستجو برای: secure computation

تعداد نتایج: 196509  

2004

This paper introduces a line of research on secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans to ...

2009
Vipul Goyal Amit Sahai

The notion of resettable zero-knowledge (rZK) was introduced by Canetti, Goldreich, Goldwasser and Micali (FOCS’01) as a strengthening of the classical notion of zero-knowledge. A rZK protocol remains zero-knowledge even if the verifier can reset the prover back to its initial state anytime during the protocol execution and force it to use the same random tape again and again. Following this wo...

Journal: :IACR Cryptology ePrint Archive 2014
Elette Boyle Kai-Min Chung Rafael Pass

We are interested in secure computation protocols in settings where the number of parties is huge and their data even larger. Assuming the existence of a single-use broadcast channel (per player), we demonstrate statistically secure computation protocols for computing (multiple) arbitrary dynamic RAM programs over parties’ inputs, handling (1/3− ) fraction static corruptions, while preserving u...

Journal: :IACR Cryptology ePrint Archive 2007
Juan A. Garay Rafail Ostrovsky

Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network has very large connectivity — in fact, , where is the number of potential corruptions in the network. This impossibility result renders existing MPC results far less applicable in practice, since many deployed network...

2009
Brian W. Pogue Alexander Iliev

The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even though this is conceptually the simplest and most general solution. Thus, current protocols involve only the direct players—we call such protocols s...

2016
Jesper Buus Nielsen Claudio Orlandi

CFEM & CTIC workshop: Theory and Practice of Secure Multiparty Computation May 30 to June 3, 2016 Aarhus University, Denmark Title: Cross&Clean: Amortized Garbled Circuits With Constant Overhead Authors: Jesper Buus Nielsen; Claudio Orlandi Garbled circuits (GC) are one of the main tools for secure two-party computation. One of the most promising techniques for efficiently achieving active-secu...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید