Search
Search Results
-
Secure multi-party computation with legally-enforceable fairness
Fairness is a security notion of secure computation and cannot always be achieved if an adversary corrupts a majority of parties in standard...
-
A trusted IoT data sharing method based on secure multi-party computation
Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security...
-
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between...
-
SEVCOD: secure and efficient verifiable computation on outsourced data
Cloud computing has gained significant popularity, as a promising service platform in recent years. It facilitates the users to offload their...
-
Anonymous voting using distributed ledger-assisted secure multi-party computation
High voter turnout in elections and referendums is desirable to ensure a robust democracy. Secure electronic voting is a vision for the future of...
-
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments
Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The...
-
High-Throughput Secure Three-Party Computation with an Honest Majority
In the setting of secure multiparty computation, a set of parties wish to carry out a joint computation of their inputs while keeping them private....
-
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation
Secure Multiparty Computation (MPC) offers privacy-preserving computation that could be critical in many health and finance applications....
-
Efficient secure multi-party computation for proof of custody in Ethereum sharding
Ethereum, one of the most prominent and widely deployed blockchain systems, is undergoing a significant upgrade that adopts sharding for capacity...
-
Secure Multi-Party Computation
Secure multi-party computation enables a group of parties to compute a function while jointly keeping their private inputs secret. The term “secure”... -
Secure Multi-Party Computation for Personalized Human Activity Recognition
Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL...
-
The oblivious comparison sorting protocols for secure multi-party computation
Sorting data is a crucial function in many systems, including database systems, because it frequently influences total system performance due to its...
-
Efficient Perfectly Secure Computation with Optimal Resilience
Secure computation enables n mutually distrustful parties to compute a function over their private inputs jointly. In 1988, Ben-Or, Goldwasser, and...
-
10-Party Sublinear Secure Computation from Standard Assumptions
Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the... -
SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in Cloud
To achieve diversified secure computations on encrypted data, in this paper, we propose and demonstrate a Secure Computation Platform (SeCPlat) based... -
A New Approach to Efficient and Secure Fixed-Point Computation
Secure Multi-Party Computation (MPC) constructions typically allow computation over a finite field or ring. While useful for many applications,... -
Secure KNN Computation on Cloud
Cloud computing has emerged as a trend of outsourcing database and query services to a powerful cloud to ease local storage and computing pressure.... -
Reusable Secure Computation in the Plain Model
Consider the standard setting of two-party computation where the sender has a secret function f and the receiver has a secret input x and the output... -
Sublinear-Communication Secure Multiparty Computation Does Not Require FHE
Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the... -
Secure Multiparty Computation with Identifiable Abort via Vindicating Release
In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort (IA) guarantees that honest parties can identify and...