Domain-Polymorphic Programming of Privacy-Preserving Applications
暂无分享,去创建一个
[1] Roman Jagomägis,et al. SecreC: a Privacy-Aware Programming Language with Applications in Data Mining , 2010 .
[2] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[3] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[4] Florian Kerschbaum,et al. Automatic Protocol Selection in Secure Two-Party Computations , 2013, NDSS.
[5] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[6] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[7] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[8] Simon L. Peyton Jones,et al. OutsideIn(X) Modular type inference with local assumptions , 2011, J. Funct. Program..
[9] Ivan Damgård,et al. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption , 2003, CRYPTO.
[10] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[11] Dan Bogdanov,et al. High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.
[12] Helmut Veith,et al. Secure two-party computations in ANSI C , 2012, CCS.
[13] Anat Paskin-Cherniavsky,et al. Evaluating Branching Programs on Encrypted Data , 2007, TCC.
[14] Ivan Damgård,et al. A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.
[15] Peng Li,et al. Encoding information flow in Haskell , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[16] Michael I. Schwartzbach,et al. A domain-specific programming language for secure multiparty computation , 2007, PLAS '07.
[17] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[18] Andrei Sabelfeld,et al. Gradual Release: Unifying Declassification, Encryption and Key Release Policies , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Deian Stefan,et al. Information-Flow Control for Programming on Encrypted Data , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[20] Rupak Majumdar,et al. MrCrypt: static analysis for secure cloud computations , 2013, OOPSLA.
[21] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[22] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[23] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[24] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[25] Dan Bogdanov,et al. Secure multi-party data analysis: end user validation and practical experiments , 2013, IACR Cryptol. ePrint Arch..
[26] Jan Willemson,et al. Round-Efficient Oblivious Database Manipulation , 2011, ISC.
[27] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[28] Peeter Laud,et al. Specifying sharemind's arithmetic black box , 2013, PETShop '13.
[29] Adi Shamir,et al. How to share a secret , 1979, CACM.
[30] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[31] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[32] Dan Bogdanov,et al. The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3 , 2012 .
[33] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[34] Jan Willemson,et al. Secure floating point arithmetic and private satellite collision analysis , 2015, International Journal of Information Security.
[35] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[36] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[37] Dan Bogdanov,et al. Oblivious Sorting of Secret-Shared Data , 2013 .
[38] Jaak Ristioja,et al. An analysis framework for an imperative privacy-preserving programming language , 2010 .
[39] Mark P. Jones. Qualified Types: Theory and Practice , 1994 .
[40] Florian Kerschbaum,et al. L1 - An Intermediate Language for Mixed-Protocol Secure Computation , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[41] Dan Bogdanov. SecreC : a Privacy-Aware Programming Language with Applications in Data Mining Master ’ s Thesis ( 30 EAP ) Supervisor : , 2010 .
[42] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.