Articles with "two party" as a keyword



Photo from wikipedia

Secure Two-Party Computation Based on Blind Quantum Computation

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-020-04479-0

Abstract: Two-party quantum computation (2PQC) allows two participants Alice and Bob to securely compute a given unitary function on their quantum inputs without leaking privacy. Existing 2PQC protocols require participants to have strong quantum capability, such… read more here.

Keywords: quantum; computation; quantum computation; two party ... See more keywords
Photo by adigold1 from unsplash

Quantum solution to a class of two-party private summation problems

Sign Up to like & get
recommendations!
Published in 2017 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1676-x

Abstract: In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security… read more here.

Keywords: class; party; private summation; quantum solution ... See more keywords
Photo by kattrinnaaaaa from unsplash

A novel quantum scheme for secure two-party distance computation

Sign Up to like & get
recommendations!
Published in 2017 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1766-9

Abstract: Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure… read more here.

Keywords: computation; secure two; secure; party distance ... See more keywords
Photo by elyaspasban from unsplash

Two-party secure semiquantum summation against the collective-dephasing noise

Sign Up to like & get
recommendations!
Published in 2022 at "Quantum Information Processing"

DOI: 10.1007/s11128-022-03459-z

Abstract: In this paper, we propose a two-party semiquantum summation protocol, where two classical users can accomplish the summation of their private binary sequences with the assistance of a quantum semi-honest third party (TP). The term… read more here.

Keywords: dephasing noise; semiquantum summation; summation; two party ... See more keywords
Photo from wikipedia

Secure two-party SM9 signing

Sign Up to like & get
recommendations!
Published in 2020 at "Science China Information Sciences"

DOI: 10.1007/s11432-018-9589-x

Abstract: Dear editor, With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currency (CBDC). In addition to… read more here.

Keywords: key; private key; digital signature; two party ... See more keywords
Photo by adigold1 from unsplash

Rational adversary with flexible utility in secure two-party computation

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0669-z

Abstract: Secure two-party computation evaluates a function among two distributed parties without revealing the parties’ inputs except for the function’s outputs. Secure two-party computation can be applied into various fields like cloud computing, which is a… read more here.

Keywords: party; party computation; secure two; rational adversary ... See more keywords
Photo from academic.microsoft.com

Duverger and the territory: explaining deviations from the two-party-competition-law

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Elections, Public Opinion and Parties"

DOI: 10.1080/17457289.2019.1658195

Abstract: According to Duverger’s Law, plurality voting systems lead to two-party competition. However, many results of national parliamentary elections deviate from this rule. In contrast to previous resear... read more here.

Keywords: duverger territory; two party; law; party competition ... See more keywords
Photo by scottwebb from unsplash

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2844190

Abstract: With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.… read more here.

Keywords: authentication; security; key exchange; efficient two ... See more keywords
Photo by rachitank from unsplash

Optimally Efficient Secure Scalar Product With Applications in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2908230

Abstract: Secure computation of scalar product is of considerable importance due to its central role in many practical computation scenarios with privacy and security requirements. This paper includes new results about the secure two-party scalar product.… read more here.

Keywords: secure; ssp protocol; scalar product; two party ... See more keywords
Photo by priscilladupreez from unsplash

Effect of Social Influence on a Two-Party Election: A Markovian Multiagent Model

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Control of Network Systems"

DOI: 10.1109/tcns.2021.3085815

Abstract: In digital social networks, the filtering algorithms employed by the platform management to sieve the contents shared among the users can alter the social influence intensity. In this article, a Markov multiagent model of opinion… read more here.

Keywords: topology; social influence; influence; two party ... See more keywords
Photo from wikipedia

Two-party quantum key agreement with five-particle entangled states

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Quantum Information"

DOI: 10.1142/s0219749917500186

Abstract: A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of… read more here.

Keywords: quantum; five particle; particle entangled; particle ... See more keywords