Secure Multiparty Computation via Oblivious Polynomial Evaluation (original) (raw)

Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation

Attila Özgit

… of Information and Networks: Proceedings of …, 2008

View PDFchevron_right

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications

Dana Dachman-soled

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Knowledge-oriented secure multiparty computation

Michael Hicks

2012

View PDFchevron_right

Non-Interactive Secure Multiparty Computation

Anat Paskin-Cherniavsky

Advances in Cryptology – CRYPTO 2014, 2014

View PDFchevron_right

MISC: Multi-Input Secure Two-Party Computation

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining

Purnima Trivedi

International Journal, 2009

View PDFchevron_right

Multi-party computation with conversion of secret sharing

Hossein Ghodosi

Designs, Codes and Cryptography, 2011

View PDFchevron_right

Secure Multiparty Computation

Jaydip Sen

B. Tech (CSE) Seminar Report, Semestr VI, Department of Computer Science and Engineering, NIST, Odisha, India., 2013

View PDFchevron_right

Fast Actively Secure Five-Party Computation with Security Beyond Abort

Megha Byali

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

View PDFchevron_right

Summary Report on Secure Computation Protocols

Ivan Visconti

2008

View PDFchevron_right

Zero-knowledge from secure multiparty computation

Rafail Ostrovsky

Proceedings of the thirty-ninth annual ACM symposium on Theory of computing - STOC '07, 2007

View PDFchevron_right

PhD thesis title: Secure and Fair Two-Party Computation

Mehmet Sabir Kiraz

alexandria.tue.nl

View PDFchevron_right

Secure Multi-Party Computation for Collaborative Data Analysis

Reda Salama

E3S Web of Conferences

View PDFchevron_right

Efficient lookup-table protocol in secure multiparty computation

Andy Moran

ACM SIGPLAN Notices, 2012

View PDFchevron_right

Secure Multiparty Computation with Minimal Interaction

Anat Paskin-Cherniavsky

2010

View PDFchevron_right

Secure error correction using multiparty computation

Mohammad G. Raeini

2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018

View PDFchevron_right

AN EFFICIENT SECURE COMPUTATION FOR PRIVACY PRESERVING DATA MINING IN MULTI PARTY COMPUTATION (MPC) – A REVIEW

IAEME Publication

IAEME PUBLICATION, 2020

View PDFchevron_right

Private function evaluation by local two-party computation

Stefan Rass

EURASIP Journal on Information Security, 2015

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

Multiparty Computation from Somewhat Homomorphic Encryption

Ivan Damgård

Lecture Notes in Computer Science, 2012

View PDFchevron_right

A New Approach to Practical Active-Secure Two-Party Computation

sai bura

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Efficient Two-Party Secure Computation on Committed Inputs

Stanislaw Jarecki

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Cryptonomial: A Framework for Private Time-Series Polynomial Calculations

Taeho Jung

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021

View PDFchevron_right

Secure Multiparty Computation between Distrusted Networks Terminals

Sen-ching S Cheung

2007

View PDFchevron_right

Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence

Sen-Ching Cheung

IEEE Transactions on Information Forensics and Security, 2017

View PDFchevron_right

Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

Hideki Imai

International Journal of Information Security, 2014

View PDFchevron_right

Efficient Multiparty Computation from Lossy Threshold Encryption

Isheeta Nargis

2019

View PDFchevron_right

Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets

Shlomi Dolev

IACR Cryptol. ePrint Arch., 2019

View PDFchevron_right

An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates

Muhammed Ali Bingol

The Computer Journal, 2018

View PDFchevron_right

Secure Multiparty Computation Goes Live

Peter Bogetoft

2009

View PDFchevron_right

Faster Secure Two-Party Computation Using Garbled Circuits

David Evans

View PDFchevron_right

Efficient and Secure Multi-party Computation for Heterogeneous Environment

IJRASET Publication

IJRASET, 2021

View PDFchevron_right

Trust Enabled Secure Multiparty Computation

Renren Dong

2010 14th International Conference Information Visualisation, 2010

View PDFchevron_right

Multiparty Reusable Non-interactive Secure Computation from LWE

Aayush Jain

Lecture Notes in Computer Science, 2021

View PDFchevron_right

Semi-trusted Collaborative Framework for Multi-party Computation

KOK-SENG WONG

KSII Transactions on Internet and Information Systems, 2010

View PDFchevron_right