On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation
暂无分享,去创建一个
[1] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[2] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[3] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[6] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[7] Andrew Paverd,et al. Enhancing communication privacy using trustworthy remote entities , 2015 .
[8] Yehuda Lindell,et al. SCAPI: The Secure Computation Application Programming Interface , 2012, IACR Cryptol. ePrint Arch..
[9] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[12] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[13] Andrew C. Simpson,et al. Exploring the use of Intel SGX for Secure Many-Party Applications , 2016, SysTEX@Middleware.
[14] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..
[15] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[16] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[17] Andrew C. Simpson,et al. Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[18] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[19] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2011, Journal of Cryptology.
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[21] Ahmad-Reza Sadeghi,et al. Secure Multiparty Computation from SGX , 2017, Financial Cryptography.
[22] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[23] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[24] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[25] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[26] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..