Secure Multiparty Computation

被引:97
|
作者
Lindell, Yehuda [1 ,2 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[2] Unbound Tech, Ramat Gan, Israel
关键词
D O I
10.1145/3387108
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:86 / 96
页数:11
相关论文
共 50 条
  • [31] Secure multiparty quantum computation with few qubits
    Lipinska, Victoria
    Ribeiro, Jeremy
    Wehner, Stephanie
    PHYSICAL REVIEW A, 2020, 102 (02)
  • [32] Oblivious array access for secure multiparty computation
    Laud, Peeter
    Cryptology and Information Security Series, 2015, 13 : 106 - 128
  • [33] The Broadcast Message Complexity of Secure Multiparty Computation
    Garg, Sanjam
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 426 - 455
  • [34] Multiparty Computation: To Secure Privacy, Do the Math
    Queue, 2023, 21 (06): : 78 - 100
  • [35] Global-Scale Secure Multiparty Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 39 - 56
  • [36] Asynchronous Secure Multiparty Computation in Constant Time
    Cohen, Ran
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 183 - 207
  • [37] Key technologies and applications of secure multiparty computation
    Guo, X. (guoxiaoqiang@heuu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [38] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [39] Secure Multiparty Quantum Computation for Summation and Multiplication
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    Scientific Reports, 6
  • [40] On Adaptively Secure Multiparty Computation with a Short CRS
    Cohen, Ran
    Peikert, Chris
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 129 - 146