Computing across Trust Boundaries using Distributed Homomorphic Cryptography
暂无分享,去创建一个
Jean-Pierre Hubaux | Juan Ramón Troncoso-Pastoriza | Christian Mouchet | J. Hubaux | J. Troncoso-Pastoriza | C. Mouchet
[1] Yehuda Lindell,et al. From Keys to Databases - Real-World Applications of Secure Multi-Party Computation , 2018, IACR Cryptol. ePrint Arch..
[2] Manfred Morari,et al. Cloud-Based MPC with Encrypted Data , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[3] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[4] Dan Bogdanov,et al. Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper) , 2012, Financial Cryptography.
[5] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[6] Vinod Vaikuntanathan,et al. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE , 2012, EUROCRYPT.
[7] Payman Mohassel,et al. SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[8] Dan Bogdanov,et al. Students and Taxes: a Privacy-Preserving Study Using Secure Computation , 2016, Proc. Priv. Enhancing Technol..
[9] Brett Hemenway,et al. SoK: General Purpose Compilers for Secure Multi-Party Computation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[10] Vinod Vaikuntanathan,et al. Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption , 2011, IACR Cryptol. ePrint Arch..
[11] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[12] Matthew K. Franklin,et al. Joint Encryption and Message-Efficient Secure Computation , 1993, CRYPTO.
[13] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[14] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[15] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[16] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[17] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[18] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[19] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[20] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[21] Amit Sahai,et al. Homomorphic Encryption Standard , 2019, IACR Cryptol. ePrint Arch..
[22] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[23] Yehuda Lindell,et al. Fast Garbling of Circuits Under Standard Assumptions , 2017, Journal of Cryptology.
[24] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[25] Yehuda Lindell,et al. How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..
[26] David J. Wu,et al. Secure genome-wide association analysis using multiparty computation , 2018, Nature Biotechnology.
[27] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[28] Dan Boneh,et al. Deriving genomic diagnoses without revealing patient genomes , 2017, Science.
[29] Dawn Xiaodong Song,et al. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution , 2018, ArXiv.
[30] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[31] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[32] Long Chen,et al. Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension , 2017, TCC.
[33] Julien Eynard,et al. A Full RNS Variant of FV Like Somewhat Homomorphic Encryption Schemes , 2016, SAC.
[34] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[35] Adi Shamir,et al. How to share a secret , 1979, CACM.
[36] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[37] Jean-Pierre Hubaux,et al. MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data , 2019, IEEE/ACM Transactions on Computational Biology and Bioinformatics.
[38] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[39] Joshua A. Kroll. Secure protocols for accountable warrant execution , 2014 .
[40] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[41] Tancrède Lepoint,et al. NFLlib: NTT-Based Fast Lattice Library , 2016, CT-RSA.
[42] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[43] Dan Bogdanov,et al. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation , 2015, Financial Cryptography.
[44] Marcel Keller,et al. Overdrive: Making SPDZ Great Again , 2018, IACR Cryptol. ePrint Arch..
[45] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[46] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[47] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[48] Stefan Katzenbeisser,et al. Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.
[49] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.