Key technologies and applications of secure multiparty computation

被引:0
|
作者
机构
[1] Guo, Xiaoqiang
[2] Zhang, Shuai
[3] Li, Ying
来源
Guo, X. (guoxiaoqiang@heuu.edu.cn) | 1600年 / Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia卷 / 11期
关键词
Compendex;
D O I
10.11591/telkomnika.v11i7.2827
中图分类号
学科分类号
摘要
Network security
引用
收藏
相关论文
共 50 条
  • [1] Practical applications of secure multiparty computation
    Talviste, Riivo
    [J]. Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [2] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [3] Secure multiparty computation of solid geometric problems and their applications
    Li, Shundong
    Wu, Chunying
    Wang, Daoshun
    Dai, Yiqi
    [J]. INFORMATION SCIENCES, 2014, 282 : 401 - 413
  • [4] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    [J]. International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [5] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [6] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [7] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [8] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [9] Fairy Ring: Ubiquitous Secure Multiparty Computation Framework for Smartphone Applications
    Teruya, Tadanori
    Aoki, Yoshiki
    Sakuina, Jun
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 708 - 712
  • [10] Two-Round Multiparty Secure Computation Minimizing Public Key Operations
    Garg, Sanjam
    Miao, Peihan
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 273 - 301