Articles with "party computation" as a keyword



Photo by adigold1 from unsplash

Rational adversary with flexible utility in secure two-party computation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0669-z

Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a… read more here.

Keywords: party; party computation; secure two; rational adversary ... See more keywords
Photo from wikipedia

AntNest: Fully Non-Interactive Secure Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2883775

Abstract: In this paper, we focus on the research of non-interactive secure multi-party computation. At first, we propose a fully homomorphic non-interactive verifiable secret sharing (FHNVSS) scheme. In this scheme, shareholders can generate shares of any-degree… read more here.

Keywords: interactive secure; secure multi; non interactive; multi party ... See more keywords

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3152498

Abstract: Genome-Wide Association Study (GWAS) aims at detecting the association between diseases and Single-Nucleotide Polymorphisms (SNPs) with statistical techniques and has great potential for disease diagnosis. To obtain high-quality results, GWAS requires large-scale genomic data containing… read more here.

Keywords: party computation; gwas; secure; association ... See more keywords
Photo from wikipedia

On the Power of Hybrid Networks in Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2018.2827360

Abstract: Perfectly-secure verifiable secret sharing (VSS) and multi-party computation (MPC) protocols in asynchronous network tolerate only at most one-fourth of corruption, while their counterparts in synchronous network sustain against at most one-third corruption. Moreover property-wise, synchronous… read more here.

Keywords: network; synchronous protocols; multi party; power hybrid ... See more keywords

A Secure Multi-Party Computation Protocol for Time-To-Event Analyses

Sign Up to like & get
recommendations!
Published in 2020 at "Studies in health technology and informatics"

DOI: 10.3233/shti200112

Abstract: The cryptographic method Secure Multi-Party Computation (SMPC) could facilitate data sharing between health institutions by making it possible to perform analyses on a "virtual data pool", providing an integrated view of data that is actually… read more here.

Keywords: party computation; secure multi; time event; multi party ... See more keywords