Secure Computation of Common Data among Malicious Partners (original) (raw)

Efficient multi-party computation with collusion-deterred secret sharing

Sen-Ching Cheung

2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014

View PDFchevron_right

Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence

Sen-Ching Cheung

IEEE Transactions on Information Forensics and Security, 2017

View PDFchevron_right

PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection

Anat Paskin-Cherniavsky

2021

View PDFchevron_right

Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants

Tham Nguyen

arXiv (Cornell University), 2021

View PDFchevron_right

Covert Multi-Party Computation

Vipul Goyal

2007

View PDFchevron_right

Practical Multi-party Private Set Intersection from Symmetric-Key Techniques

Naor Matania

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security

View PDFchevron_right

PhD thesis title: Secure and Fair Two-Party Computation

Mehmet Sabir Kiraz

alexandria.tue.nl

View PDFchevron_right

Secure Multiparty Computation with Minimal Interaction

Anat Paskin-Cherniavsky

2010

View PDFchevron_right

Trust Enabled Secure Multiparty Computation

Renren Dong

2010 14th International Conference Information Visualisation, 2010

View PDFchevron_right

Private and Efficient Set Intersection Protocol for Big Data Analytics

Zakaria Gheid

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Efficient and secure multi-party computation with faulty majority and complete fairness

Juan A. Garay

To appear, 2004

View PDFchevron_right

Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants

Edoardo Airoldi

21st International Conference on Data Engineering (ICDE'05), 2005

View PDFchevron_right

An efficient protocol for fair secure two-party computation

Berry Schoenmakers, Mehmet Sabir Kiraz

Topics in Cryptology–CT-RSA 2008, 2008

View PDFchevron_right

Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract

be honest

1989

View PDFchevron_right

Secure multiparty computation between distrusted networks terminals

Sen-ching S Cheung

2007

View PDFchevron_right

A scalable multi-party protocol for privacy-preserving equality test

Ernesto Damiani

2013

View PDFchevron_right

Information Theoretically Secure Multi Party Set Intersection Re-visited

Ashish Choudhary

Selected Areas in Cryptography, 2009

View PDFchevron_right

Semi-trusted Collaborative Framework for Multi-party Computation

KOK-SENG WONG

KSII Transactions on Internet and Information Systems, 2010

View PDFchevron_right

Fast Actively Secure Five-Party Computation with Security Beyond Abort

Megha Byali

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

View PDFchevron_right

Knowledge-oriented secure multiparty computation

Mudhakar Srivatsa

Proceedings of the 7th Workshop on Programming Languages and Analysis for Security - PLAS '12, 2012

View PDFchevron_right

Round Efficiency of Multi-party Computation with a Dishonest Majority

Rafail Ostrovsky

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Efficient Set Intersection with Simulation-Based Security

Carmit Hazay

Journal of Cryptology, 2014

View PDFchevron_right

Secure Multi-Party Computation for Collaborative Data Analysis

Reda Salama

E3S Web of Conferences

View PDFchevron_right

Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution

David Evans

2012

View PDFchevron_right

Assisting Server for Secure Multi-Party Computation

Wenting Li

2012

View PDFchevron_right

Practical Private Set Intersection Protocols with Linear Complexity

Emiliano De Cristofaro

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Unconditionally Secure Multiparty Set Intersection Re-Visited

Ashish choudhary

eprint.iacr.org

View PDFchevron_right

Efficient lookup-table protocol in secure multiparty computation

Andy Moran

ACM SIGPLAN Notices, 2012

View PDFchevron_right

Multi-Party Trust Computation in Decentralized Environments

Antonis Michalas

View PDFchevron_right

Broadcast-Efficient Secure Multiparty Computation

Juan A. Garay

View PDFchevron_right

Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data-- Full version -- IEEE TKDE

Shantanu Sharma

IEEE Transactions on Knowledge and Data Engineering (TKDE), 2020

View PDFchevron_right

Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation

Pragnyaban Mishra

International Journal of Intelligent Engineering and Systems

View PDFchevron_right

Efficient robust private set intersection

Dana Dachman-soled

International Journal of Applied Cryptography, 2012

View PDFchevron_right