Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
暂无分享,去创建一个
[1] Klaus Wehrle,et al. POSTER: Privacy-preserving Indoor Localization , 2014, ArXiv.
[2] Florian Kerschbaum,et al. L1 - An Intermediate Language for Mixed-Protocol Secure Computation , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[3] Emiliano De Cristofaro,et al. Genodroid: are privacy-preserving genomic tests ready for prime time? , 2012, WPES '12.
[4] Helmut Veith,et al. Secure two-party computations in ANSI C , 2012, CCS.
[5] Michael K. Reiter,et al. Automatic generation of two-party computations , 2003, CCS '03.
[6] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[7] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..
[8] Michael I. Schwartzbach,et al. A domain-specific programming language for secure multiparty computation , 2007, PLAS '07.
[9] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[10] Zekeriya Erkin,et al. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.
[11] Ahmad-Reza Sadeghi,et al. From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design , 2010, IACR Cryptol. ePrint Arch..
[12] Petros Boufounos,et al. Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.
[13] Florian Kerschbaum,et al. Forecasting Run-Times of Secure Two-Party Computation , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[14] Petros Boufounos,et al. Privacy-Preserving Nearest Neighbor Methods , 2013 .
[15] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] Marina Blanton,et al. Empirical Evaluation of Secure Two-Party Computation Models , 2005 .
[18] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[19] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[20] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[21] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[22] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[23] Yihua Zhang,et al. PICCO: a general-purpose compiler for private distributed computation , 2013, CCS.
[24] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[25] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[26] Marina Blanton,et al. Secure computation of hidden Markov models , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[27] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.