Articles with "party computation" as a keyword



Rational adversary with flexible utility in secure two-party computation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0669-z

Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a… read more here.

Keywords: party; party computation; secure two; rational adversary ... See more keywords

Anonymous voting using distributed ledger-assisted secure multi-party computation

Sign Up to like & get
recommendations!
Published in 2024 at "Applied Network Science"

DOI: 10.1007/s41109-024-00650-2

Abstract: High voter turnout in elections and referendums is desirable to ensure a robust democracy. Secure electronic voting is a vision for the future of elections and referendums. Such a system can counteract factors hindering strong… read more here.

Keywords: secure multi; voting; secure; party computation ... See more keywords

AntNest: Fully Non-Interactive Secure Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2883775

Abstract: In this paper, we focus on the research of non-interactive secure multi-party computation. At first, we propose a fully homomorphic non-interactive verifiable secret sharing (FHNVSS) scheme. In this scheme, shareholders can generate shares of any-degree… read more here.

Keywords: interactive secure; secure multi; non interactive; multi party ... See more keywords

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3152498

Abstract: Genome-Wide Association Study (GWAS) aims at detecting the association between diseases and Single-Nucleotide Polymorphisms (SNPs) with statistical techniques and has great potential for disease diagnosis. To obtain high-quality results, GWAS requires large-scale genomic data containing… read more here.

Keywords: party computation; gwas; secure; association ... See more keywords
Photo from wikipedia

On the Power of Hybrid Networks in Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2827360

Abstract: Perfectly-secure verifiable secret sharing (VSS) and multi-party computation (MPC) protocols in asynchronous network tolerate only at most one-fourth of corruption, while their counterparts in synchronous network sustain against at most one-third corruption. Moreover property-wise, synchronous… read more here.

Keywords: network; synchronous protocols; multi party; power hybrid ... See more keywords

A Secure Multi-Party Computation Protocol for Time-To-Event Analyses

Sign Up to like & get
recommendations!
Published in 2020 at "Studies in health technology and informatics"

DOI: 10.3233/shti200112

Abstract: The cryptographic method Secure Multi-Party Computation (SMPC) could facilitate data sharing between health institutions by making it possible to perform analyses on a "virtual data pool", providing an integrated view of data that is actually… read more here.

Keywords: party computation; secure multi; time event; multi party ... See more keywords

Enhancing Secure Multi-Party Computation with Damgård–Jurik and NIZK Proofs: A Lightweight Protocol for Scalable Aggregation

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Sciences"

DOI: 10.3390/app151910357

Abstract: Privacy-preserving secure multi-party computation protocols are known to face scalability and efficiency challenges in environments where participants hold distinct attributes of the same records (vertical partitioning) or controls a subset of complete records (horizontal partitioning),… read more here.

Keywords: secure multi; party computation; multi party; damg jurik ... See more keywords