Secure Multiparty Computation via Oblivious Polynomial Evaluation (original) (raw)
Related papers
Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation
… of Information and Networks: Proceedings of …, 2008
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications
Lecture Notes in Computer Science, 2011
Knowledge-oriented secure multiparty computation
2012
Non-Interactive Secure Multiparty Computation
Advances in Cryptology – CRYPTO 2014, 2014
MISC: Multi-Input Secure Two-Party Computation
The ISC International Journal of Information Security, 2023
A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining
International Journal, 2009
Multi-party computation with conversion of secret sharing
Designs, Codes and Cryptography, 2011
B. Tech (CSE) Seminar Report, Semestr VI, Department of Computer Science and Engineering, NIST, Odisha, India., 2013
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Summary Report on Secure Computation Protocols
2008
Zero-knowledge from secure multiparty computation
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing - STOC '07, 2007
PhD thesis title: Secure and Fair Two-Party Computation
alexandria.tue.nl
Secure Multi-Party Computation for Collaborative Data Analysis
E3S Web of Conferences
Efficient lookup-table protocol in secure multiparty computation
ACM SIGPLAN Notices, 2012
Secure Multiparty Computation with Minimal Interaction
2010
Secure error correction using multiparty computation
2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018
IAEME PUBLICATION, 2020
Private function evaluation by local two-party computation
EURASIP Journal on Information Security, 2015
Committed Oblivious Transfer and Private Multi-Party Computation
Lecture Notes in Computer Science, 1995
Multiparty Computation from Somewhat Homomorphic Encryption
Lecture Notes in Computer Science, 2012
A New Approach to Practical Active-Secure Two-Party Computation
Lecture Notes in Computer Science, 2012
Efficient Two-Party Secure Computation on Committed Inputs
Lecture Notes in Computer Science, 2007
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021
Secure Multiparty Computation between Distrusted Networks Terminals
2007
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence
IEEE Transactions on Information Forensics and Security, 2017
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
International Journal of Information Security, 2014
Efficient Multiparty Computation from Lossy Threshold Encryption
2019
IACR Cryptol. ePrint Arch., 2019
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
The Computer Journal, 2018
Secure Multiparty Computation Goes Live
2009
Faster Secure Two-Party Computation Using Garbled Circuits
Efficient and Secure Multi-party Computation for Heterogeneous Environment
IJRASET, 2021
Trust Enabled Secure Multiparty Computation
2010 14th International Conference Information Visualisation, 2010
Multiparty Reusable Non-interactive Secure Computation from LWE
Lecture Notes in Computer Science, 2021
Semi-trusted Collaborative Framework for Multi-party Computation
KSII Transactions on Internet and Information Systems, 2010