Privacy-Preserving Outsourced Calculation on Floating Point Numbers
暂无分享,去创建一个
Robert H. Deng | Ximeng Liu | Rongxing Lu | Baodong Qin | Wenxiu Ding | Ximeng Liu | Rongxing Lu | R. Deng | Baodong Qin | Wenxiu Ding
[1] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[2] Jianfeng Ma,et al. Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.
[3] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[4] Jan Willemson,et al. Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations , 2014, ISC.
[5] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[6] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[7] Rajarshi Shahu,et al. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2016 .
[8] Marcel Keller,et al. An architecture for practical actively secure MPC with dishonest majority , 2013, IACR Cryptol. ePrint Arch..
[9] Robert H. Deng,et al. An Efficient Privacy-Preserving Outsourced Computation over Public Data , 2017, IEEE Transactions on Services Computing.
[10] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Yi-Ting Chiang,et al. Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application , 2013, KES.
[13] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[14] Jameela Al-Jaroodi,et al. e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Jean-Michel Muller,et al. Handbook of Floating-Point Arithmetic (2nd Ed.) , 2018 .
[17] Stanley B. Zdonik,et al. Answering Aggregation Queries in a Secure System Model , 2007, VLDB.
[18] Sanjam Garg,et al. Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation , 2015, TCC.
[19] Daniel Wichs,et al. Two Round Multiparty Computation via Multi-key FHE , 2016, EUROCRYPT.
[20] James Demmel,et al. IEEE Standard for Floating-Point Arithmetic , 2008 .
[21] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[22] Craig Gentry,et al. Two-Round Secure MPC from Indistinguishability Obfuscation , 2014, TCC.
[23] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[24] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[25] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[26] Sander Siim,et al. Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations , 2015, Financial Cryptography Workshops.
[27] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[28] Jan Willemson,et al. Secure floating point arithmetic and private satellite collision analysis , 2015, International Journal of Information Security.
[29] Ahmad-Reza Sadeghi,et al. Secure Evaluation of Private Linear Branching Programs with Medical Applications , 2009, ESORICS.
[30] Yihua Zhang,et al. Secure Computation on Floating Point Numbers , 2013, NDSS.
[31] Emmanuel Bresson,et al. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.
[32] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[33] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[34] Kim-Kwang Raymond Choo,et al. A Forensically Sound Adversary Model for Mobile Devices , 2015, PloS one.
[35] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[36] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[37] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[38] Brent Waters,et al. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.
[39] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[40] Henk C. A. van Tilborg. Chinese Remainder Theorem , 2005, Encyclopedia of Cryptography and Security.
[41] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[42] B. Ideograms. The Unicode Standard, Version 12.0 , 2017 .
[43] Hisao Tajiri,et al. Plasma insulin, C‐peptide and blood glucose and the risk of gastric cancer: The Japan Public Health Center‐based prospective study , 2015, International journal of cancer.
[44] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[45] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[46] Craig Gentry,et al. Private Database Queries Using Somewhat Homomorphic Encryption , 2013, ACNS.
[47] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[48] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[49] Donald E. Knuth. The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .
[50] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[51] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[52] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.