Secure multi-party computation protocol using asymmetric encryption
暂无分享,去创建一个
[1] D.K. Mishra,et al. Anonymity enabled secure multi-party computation for indian BPO , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[2] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.
[3] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[4] Vladimir Zadorozhny,et al. Secure Multi-party Computations and Privacy Preservation: Results and Open Problems , 2007 .
[5] Moni Naor,et al. A minimal model for secure computation (extended abstract) , 1994, STOC '94.
[6] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[7] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[8] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[9] Stark C. Draper,et al. Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.
[10] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[11] D.K. Mishra,et al. A zero-hacking protocol for secure multiparty computation using multiple TTP , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[12] Joachim Biskup,et al. On Pseudonymization of Audit Data for Intrusion Detection , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[13] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[14] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Ueli Maurer. The role of cryptography in database security , 2004, SIGMOD '04.