نتایج جستجو برای: secure computation

تعداد نتایج: 196509  

2016
Rafael Pass Elaine Shi Florian Tramèr

Realistic secure processors, including those built for academic and commercial purposes, commonly realize an “attested execution” abstraction. Despite being the de facto standard for modern secure processors, the “attested execution” abstraction has not received adequate formal treatment. We provide formal abstractions for “attested execution” secure processors and rigorously explore its expres...

2004
Pradeep Ravikumar William W. Cohen Stephen E. Fienberg

An important problem is that of finding matching pairs of records from heterogeneous databases, while maintaining privacy of the database parties. As we have shown in earlier work, distance metrics are a useful tool for record-linkage in many domains, and thus secure computation of distance metrics is quite important for secure record-linkage. In this paper, we consider the computation of a num...

2012
Abhishek Jain

of the Dissertation New Frontiers in Secure Computation

Journal: :CoRR 2010
Rashid Sheikh Beerendra Kumar Durgesh Kumar Mishra

Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions. Secure sum computation allows parties to compute the sum of their individual inputs without disclosing the inputs to one another. In this p...

Journal: :IACR Cryptology ePrint Archive 2016
Jonathan Katz Alex J. Malozemoff Xiao Wang

Secure two-party computation based on cut-and-choose has made great strides in recent years, with a significant reduction in the total number of garbled circuits required. Nevertheless, the overhead of cut-and-choose can still be significant for large circuits (i.e., a factor of ρ in both communication and computation for statistical security 2−ρ). We show that for a particular class of computa...

2003
Matthias Fitzi Martin Hirt Thomas Holenstein Jürg Wullschleger

Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., f ≤ t. If f exceeds t then these protocols are completely insecure. We relax this binary concept to the notion of two-threshold security: Such protocols guarantee full security as long as f ≤ t for some small threshol...

2017
Mohammad F. Anagreh Pille Pullonen

This is the scientific report for the paper entitled “Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings”. This research produces a powerful idea for transforming any semi-honestly secure multiparty computation (MPC) into an actively secure protocol while taking into consideration reducing the threshold of tolerance corruption for real parties by semi-honest adversa...

2014
Akshay Wadia

of the Dissertation Secure Computation from Hardware Assumptions

Journal: :IACR Cryptology ePrint Archive 2017
Mike Rosulek Morgan Shirley

We study the problem of secure two-party computation in the presence of a trusted setup. If there is an unconditionally UC-secure protocol for f that makes use of calls to an ideal g, then we say that f reduces to g (and write f v g). Some g are complete in the sense that all functions reduce to g. However, almost nothing is known about the power of an incomplete g in this setting. We shed ligh...

2000
Martin Hirt Ueli Maurer Bartosz Przydatek

Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید