Secure Multiparty Multisets Computation

被引:0
|
作者
Pan, Jiahao [1 ]
Dou, Jiawei [1 ]
机构
[1] School of Mathematics and Statistics, Shaanxi Normal University, Xi’an,710119, China
关键词
Compendex;
D O I
10.6633/IJNS.202305_25(3).05
中图分类号
学科分类号
摘要
Cryptography
引用
收藏
页码:425 / 430
相关论文
共 50 条
  • [41] A Scripting Language for Automating Secure Multiparty Computation
    Chen, Kung
    Hsu, Tsan-sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
  • [42] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [43] Bit Decomposition Protocols in Secure Multiparty Computation
    Laud, Peeter
    Pankova, Alisa
    [J]. WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 37 - 48
  • [44] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [45] Proactive Secure Multiparty Computation with a Dishonest Majority
    Eldefrawy, Karim
    Ostrovsky, Rafail
    Park, Sunoo
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 200 - 215
  • [46] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    [J]. MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
  • [47] On 2-round secure multiparty computation
    Gennaro, R
    Ishai, Y
    Kushilevitz, E
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 178 - 193
  • [48] Secure Multiparty Computation and Application in Machine Learning
    Guo J.
    Wang Q.
    Xu X.
    Wang T.
    Lin J.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2163 - 2186
  • [49] Characterization of Secure Multiparty Computation Without Broadcast
    Cohen, Ran
    Haitner, Iftach
    Omri, Eran
    Rotem, Lior
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (02) : 587 - 609
  • [50] REALIZING SECURE MULTIPARTY COMPUTATION ON INCOMPLETE NETWORKS
    Vaya, Shailesh
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 270 - 277