Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-021-04902-0
Abstract: Blind quantum computation (BQC) allows quantum-limited clients to delegate their quantum-computing tasks to a remote quantum server while keep their inputs, outputs, and algorithms private during the computation. Secure multi-party computation aims to solve the…
read more here.
Keywords:
secure multi;
quantum computation;
multi party;
computation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2883775
Abstract: In this paper, we focus on the research of non-interactive secure multi-party computation. At first, we propose a fully homomorphic non-interactive verifiable secret sharing (FHNVSS) scheme. In this scheme, shareholders can generate shares of any-degree…
read more here.
Keywords:
interactive secure;
secure multi;
non interactive;
multi party ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Studies in health technology and informatics"
DOI: 10.3233/shti200112
Abstract: The cryptographic method Secure Multi-Party Computation (SMPC) could facilitate data sharing between health institutions by making it possible to perform analyses on a "virtual data pool", providing an integrated view of data that is actually…
read more here.
Keywords:
party computation;
secure multi;
time event;
multi party ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Entropy"
DOI: 10.3390/e25040590
Abstract: In this paper, we propose a secure multi-party summation based on single photons. With the help of a semi-honest third party, n participants can simultaneously obtain the summation result without revealing their secret inputs. Our…
read more here.
Keywords:
party;
single photons;
multi party;
party summation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Photonics"
DOI: 10.3390/photonics10050558
Abstract: In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party summation protocols,…
read more here.
Keywords:
party;
multi party;
party summation;
secure multi ... See more keywords