We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Filters applied:

Search Results

Showing 1-20 of 41,564 results
  1. Secure multi-party computation with legally-enforceable fairness

    Fairness is a security notion of secure computation and cannot always be achieved if an adversary corrupts a majority of parties in standard...

    Takeshi Nakai, Kazumasa Shinagawa in International Journal of Information Security
    Article Open access 29 August 2024
  2. A trusted IoT data sharing method based on secure multi-party computation

    Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security...

    Li Ma, Binbin Duan, ... Dongchao Ma in Journal of Cloud Computing
    Article Open access 13 September 2024
  3. Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

    Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between...

    Yun Luo, Yuling Chen, ... Hui Dou in Journal of Cloud Computing
    Article Open access 22 January 2024
  4. SEVCOD: secure and efficient verifiable computation on outsourced data

    Cloud computing has gained significant popularity, as a promising service platform in recent years. It facilitates the users to offload their...

    Partha Sarathi Chakraborty, Omkar Santosh Gavhane, Somanath Tripathy in Cluster Computing
    Article 08 December 2023
  5. Anonymous voting using distributed ledger-assisted secure multi-party computation

    High voter turnout in elections and referendums is desirable to ensure a robust democracy. Secure electronic voting is a vision for the future of...

    Maximilian Schiedermeier, Omar Hasan, ... Harald Kosch in Applied Network Science
    Article Open access 28 August 2024
  6. MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments

    Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The...

    Veni Thangaraj, Thankaraja Raja Sree in Journal of Cloud Computing
    Article Open access 12 April 2024
  7. High-Throughput Secure Three-Party Computation with an Honest Majority

    In the setting of secure multiparty computation, a set of parties wish to carry out a joint computation of their inputs while keeping them private....

    Jun Furukawa, Yehuda Lindell, ... Or Weinstein in Journal of Cryptology
    Article 22 May 2023
  8. MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation

    Secure Multiparty Computation (MPC) offers privacy-preserving computation that could be critical in many health and finance applications....

    Oscar G. Bautista, Mohammad Hossein Manshaei, ... Selcuk Uluagac in Journal of Network and Systems Management
    Article 21 July 2023
  9. Efficient secure multi-party computation for proof of custody in Ethereum sharding

    Ethereum, one of the most prominent and widely deployed blockchain systems, is undergoing a significant upgrade that adopts sharding for capacity...

    Yuxin Tong, Xiang Xie, ... Rui Xue in Designs, Codes and Cryptography
    Article 27 March 2024
  10. Secure Multi-Party Computation

    Secure multi-party computation enables a group of parties to compute a function while jointly keeping their private inputs secret. The term “secure”...
    Louis-Henri Merino, José Cabrero-Holgueras in Trends in Data Protection and Encryption Technologies
    Chapter Open access 2023
  11. Secure Multi-Party Computation for Personalized Human Activity Recognition

    Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL...

    David Melanson, Ricardo Maia, ... Martine De Cock in Neural Processing Letters
    Article 10 March 2023
  12. The oblivious comparison sorting protocols for secure multi-party computation

    Sorting data is a crucial function in many systems, including database systems, because it frequently influences total system performance due to its...

    Koteswara Rao Ch, Kunwar Singh, Anoop Kumar in Multimedia Tools and Applications
    Article 27 January 2024
  13. Efficient Perfectly Secure Computation with Optimal Resilience

    Secure computation enables n mutually distrustful parties to compute a function over their private inputs jointly. In 1988, Ben-Or, Goldwasser, and...

    Ittai Abraham, Gilad Asharov, Avishay Yanai in Journal of Cryptology
    Article 27 September 2022
  14. 10-Party Sublinear Secure Computation from Standard Assumptions

    Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the...
    Geoffroy Couteau, Naman Kumar in Advances in Cryptology – CRYPTO 2024
    Conference paper 2024
  15. SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in Cloud

    To achieve diversified secure computations on encrypted data, in this paper, we propose and demonstrate a Secure Computation Platform (SeCPlat) based...
    Fanyou Zhao, Yiping Teng, ... Jiawei Qi in Web and Big Data
    Conference paper 2024
  16. A New Approach to Efficient and Secure Fixed-Point Computation

    Secure Multi-Party Computation (MPC) constructions typically allow computation over a finite field or ring. While useful for many applications,...
    Tore Kasper Frederiksen, Jonas Lindstrøm, ... Anne Dorte Spangsberg in Applied Cryptography and Network Security
    Conference paper 2024
  17. Secure KNN Computation on Cloud

    Cloud computing has emerged as a trend of outsourcing database and query services to a powerful cloud to ease local storage and computing pressure....
    Tikaram Sanyashi, Nirmal Kumar Boran, Virendra Singh in Information Systems Security
    Conference paper 2023
  18. Reusable Secure Computation in the Plain Model

    Consider the standard setting of two-party computation where the sender has a secret function f and the receiver has a secret input x and the output...
    Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. Sublinear-Communication Secure Multiparty Computation Does Not Require FHE

    Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the...
    Elette Boyle, Geoffroy Couteau, Pierre Meyer in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  20. Secure Multiparty Computation with Identifiable Abort via Vindicating Release

    In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort (IA) guarantees that honest parties can identify and...
    Ran Cohen, Jack Doerner, ... Abhi Shelat in Advances in Cryptology – CRYPTO 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.