Towards efficient private distributed computation on unbounded input streams
暂无分享,去创建一个
Shlomi Dolev | Yelena Yuditsky | Vladimir Kolesnikov | Juan A. Garay | Niv Gilboa | J. Garay | S. Dolev | V. Kolesnikov | N. Gilboa | Yelena Yuditsky
[1] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[2] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[3] Shlomi Dolev,et al. Direction election in flocking swarms , 2010, DIALM-POMC '10.
[4] Paul G. Spirakis,et al. Information security for sensors by overwhelming random sequences and permutations , 2014, Ad Hoc Networks.
[5] Shlomi Dolev,et al. Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[6] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Adi Shamir,et al. RFID Authentication Efficient Proactive Information Security within Computational Security , 2009, Theory of Computing Systems.
[13] Kevin L. Moore,et al. Flight demonstrations of unmanned aerial vehicle swarming concepts , 2006 .
[14] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[15] Shlomi Dolev,et al. Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation , 2011, ICS.