Malicious computation prevention protocol for secure multi-party computation
暂无分享,去创建一个
[1] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[2] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[3] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[4] Yehuda Lindell. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, CRYPTO.
[5] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[8] Chris Clifton,et al. Leveraging the "Multi" in secure multi-party computation , 2003, WPES '03.
[9] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[10] Yuval Ishai,et al. Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , 2005, CRYPTO.
[11] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[12] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[13] Durgesh Kumar Mishra,et al. A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining , 2009, ArXiv.
[14] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.