From Input Private to Universally Composable Secure Multi-party Computation Primitives
暂无分享,去创建一个
[1] Riivo Talviste,et al. From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting , 2013, ACNS.
[2] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[3] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[4] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[6] Ueli Maurer,et al. Abstract Cryptography , 2011, ICS.
[7] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[8] Dan Bogdanov,et al. Domain-Polymorphic Programming of Privacy-Preserving Applications , 2014, PLAS@ECOOP.
[9] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[10] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[11] Ran Canetti,et al. Universally Composable Symbolic Security Analysis , 2009, Journal of Cryptology.
[12] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[13] Ralf Küsters,et al. Universally Composable Symmetric Encryption , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[14] Birgit Pfitzmann,et al. A composable cryptographic library with nested operations , 2003, CCS '03.
[15] Tomas Toft. Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.
[16] Dan Bogdanov,et al. High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.
[17] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[18] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[19] Rafail Ostrovsky,et al. New Techniques for Noninteractive Zero-Knowledge , 2012, JACM.
[20] Birgit Pfitzmann,et al. The reactive simulatability (RSIM) framework for asynchronous systems , 2007, Inf. Comput..
[21] Dan Bogdanov. Sharemind: programmable secure computations with practical applications , 2013 .