Articles with "secure multi" as a keyword



Secure Multi-Party Quantum Computation Based on Blind Quantum Computation

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-021-04902-0

Abstract: Blind quantum computation (BQC) allows quantum-limited clients to delegate their quantum-computing tasks to a remote quantum server while keep their inputs, outputs, and algorithms private during the computation. Secure multi-party computation aims to solve the… read more here.

Keywords: secure multi; quantum computation; multi party; computation ... See more keywords

Anonymous voting using distributed ledger-assisted secure multi-party computation

Sign Up to like & get
recommendations!
Published in 2024 at "Applied Network Science"

DOI: 10.1007/s41109-024-00650-2

Abstract: High voter turnout in elections and referendums is desirable to ensure a robust democracy. Secure electronic voting is a vision for the future of elections and referendums. Such a system can counteract factors hindering strong… read more here.

Keywords: secure multi; voting; secure; party computation ... See more keywords

AntNest: Fully Non-Interactive Secure Multi-Party Computation

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2883775

Abstract: In this paper, we focus on the research of non-interactive secure multi-party computation. At first, we propose a fully homomorphic non-interactive verifiable secret sharing (FHNVSS) scheme. In this scheme, shareholders can generate shares of any-degree… read more here.

Keywords: interactive secure; secure multi; non interactive; multi party ... See more keywords

Secure Multi-Party Learning: Fundamentals, Frameworks, State of the Art, Trends, and Challenges

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2025.3566140

Abstract: The proliferation of networked data across various interconnected systems has intensified concerns about data leakage, particularly when computinginformation from multiple sources. Ensuring privacy while training high-performance machine learning (ML) models within these complex networks remains… read more here.

Keywords: secure multi; multi party; paper; party learning ... See more keywords

A Secure Multi-Party Computation Protocol for Time-To-Event Analyses

Sign Up to like & get
recommendations!
Published in 2020 at "Studies in health technology and informatics"

DOI: 10.3233/shti200112

Abstract: The cryptographic method Secure Multi-Party Computation (SMPC) could facilitate data sharing between health institutions by making it possible to perform analyses on a "virtual data pool", providing an integrated view of data that is actually… read more here.

Keywords: party computation; secure multi; time event; multi party ... See more keywords

Enhancing Secure Multi-Party Computation with Damgård–Jurik and NIZK Proofs: A Lightweight Protocol for Scalable Aggregation

Sign Up to like & get
recommendations!
Published in 2025 at "Applied Sciences"

DOI: 10.3390/app151910357

Abstract: Privacy-preserving secure multi-party computation protocols are known to face scalability and efficiency challenges in environments where participants hold distinct attributes of the same records (vertical partitioning) or controls a subset of complete records (horizontal partitioning),… read more here.

Keywords: secure multi; party computation; multi party; damg jurik ... See more keywords

Quantum Secure Multi-Party Summation Using Single Photons

Sign Up to like & get
recommendations!
Published in 2023 at "Entropy"

DOI: 10.3390/e25040590

Abstract: In this paper, we propose a secure multi-party summation based on single photons. With the help of a semi-honest third party, n participants can simultaneously obtain the summation result without revealing their secret inputs. Our… read more here.

Keywords: party; single photons; multi party; party summation ... See more keywords
Photo by ldxcreative from unsplash

Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption

Sign Up to like & get
recommendations!
Published in 2023 at "Photonics"

DOI: 10.3390/photonics10050558

Abstract: In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party summation protocols,… read more here.

Keywords: party; multi party; party summation; secure multi ... See more keywords