Secure Computation of Common Data among Malicious Partners (original) (raw)
Related papers
Efficient multi-party computation with collusion-deterred secret sharing
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence
IEEE Transactions on Information Forensics and Security, 2017
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
2021
arXiv (Cornell University), 2021
Covert Multi-Party Computation
2007
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PhD thesis title: Secure and Fair Two-Party Computation
alexandria.tue.nl
Secure Multiparty Computation with Minimal Interaction
2010
Trust Enabled Secure Multiparty Computation
2010 14th International Conference Information Visualisation, 2010
Private and Efficient Set Intersection Protocol for Big Data Analytics
Lecture Notes in Computer Science, 2017
Efficient and secure multi-party computation with faulty majority and complete fairness
To appear, 2004
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
21st International Conference on Data Engineering (ICDE'05), 2005
An efficient protocol for fair secure two-party computation
Berry Schoenmakers, Mehmet Sabir Kiraz
Topics in CryptologyCT-RSA 2008, 2008
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract
1989
Secure multiparty computation between distrusted networks terminals
2007
A scalable multi-party protocol for privacy-preserving equality test
2013
Information Theoretically Secure Multi Party Set Intersection Re-visited
Selected Areas in Cryptography, 2009
Semi-trusted Collaborative Framework for Multi-party Computation
KSII Transactions on Internet and Information Systems, 2010
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Knowledge-oriented secure multiparty computation
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security - PLAS '12, 2012
Round Efficiency of Multi-party Computation with a Dishonest Majority
Lecture Notes in Computer Science, 2003
Efficient Set Intersection with Simulation-Based Security
Journal of Cryptology, 2014
Secure Multi-Party Computation for Collaborative Data Analysis
E3S Web of Conferences
Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution
2012
Assisting Server for Secure Multi-Party Computation
2012
Practical Private Set Intersection Protocols with Linear Complexity
Lecture Notes in Computer Science, 2010
Unconditionally Secure Multiparty Set Intersection Re-Visited
eprint.iacr.org
Efficient lookup-table protocol in secure multiparty computation
ACM SIGPLAN Notices, 2012
Multi-Party Trust Computation in Decentralized Environments
Broadcast-Efficient Secure Multiparty Computation
IEEE Transactions on Knowledge and Data Engineering (TKDE), 2020
Secure and Verifiable Multi-Party Computation Using Indistinguishability Obfuscation
International Journal of Intelligent Engineering and Systems
Efficient robust private set intersection
International Journal of Applied Cryptography, 2012