Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0669-z
Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a…
read more here.
Keywords:
party;
party computation;
secure two;
rational adversary ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2883775
Abstract: In this paper, we focus on the research of non-interactive secure multi-party computation. At first, we propose a fully homomorphic non-interactive verifiable secret sharing (FHNVSS) scheme. In this scheme, shareholders can generate shares of any-degree…
read more here.
Keywords:
interactive secure;
secure multi;
non interactive;
multi party ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3152498
Abstract: Genome-Wide Association Study (GWAS) aims at detecting the association between diseases and Single-Nucleotide Polymorphisms (SNPs) with statistical techniques and has great potential for disease diagnosis. To obtain high-quality results, GWAS requires large-scale genomic data containing…
read more here.
Keywords:
party computation;
gwas;
secure;
association ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2018 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2018.2827360
Abstract: Perfectly-secure verifiable secret sharing (VSS) and multi-party computation (MPC) protocols in asynchronous network tolerate only at most one-fourth of corruption, while their counterparts in synchronous network sustain against at most one-third corruption. Moreover property-wise, synchronous…
read more here.
Keywords:
network;
synchronous protocols;
multi party;
power hybrid ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Studies in health technology and informatics"
DOI: 10.3233/shti200112
Abstract: The cryptographic method Secure Multi-Party Computation (SMPC) could facilitate data sharing between health institutions by making it possible to perform analyses on a "virtual data pool", providing an integrated view of data that is actually…
read more here.
Keywords:
party computation;
secure multi;
time event;
multi party ... See more keywords