Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Secure Multiparty Computation Goes Live - MaRDI portal

Secure Multiparty Computation Goes Live

From MaRDI portal
Publication:3655178

DOI10.1007/978-3-642-03549-4_20zbMath1417.94045OpenAlexW1595357546MaRDI QIDQ3655178

Kurt Nielsen, Janus Dam Nielsen, Peter Bogetoft, Jakob Illeborg Pagter, Jesper Buus Nielsen, Martin Geisler, Dan Lund Christensen, Tomas Toft, Mikkel Krøigaard, Ivan B. Damgård, Thomas Pelle Jakobsen, Michael I. Schwartzbach

Publication date: 7 January 2010

Published in: Financial Cryptography and Data Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03549-4_20




Related Items (39)

Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line MarketplacesMhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPAn efficient structural attack on NIST submission DAGSSecure Computation with Minimal Interaction, RevisitedPoW-Based Distributed Cryptography with No Trusted Setup\( \mathsf{Rabbit} \): efficient comparison for secure multi-party computationRate-limited secure function evaluationHigh throughput secure MPC over small population in hybrid networks (extended abstract)Private liquidity matching using MPCPrivacy Assurances in Multiple Data-Aggregation TransactionsImproved signature schemes for secure multi-party computation with certified inputsSecure multi-party computation in large networksA formal treatment of the role of verified compilers in secure computationEfficient Computations over Encrypted Data BlocksA Secure and Efficient Protocol for Electronic Treasury AuctionsKicking-the-bucket: fast privacy-preserving trading using bucketsTIDE: a novel approach to constructing timed-release encryptionAmortizing division and exponentiationOn compiling Boolean circuits optimized for secure multi-party computationCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationConcretely efficient large-scale MPC with active security (or tinykeys for tinyot)Implementing Two-Party Computation Efficiently with Security Against Malicious AdversariesWhen Is a Semi-honest Secure Multiparty Computation Valuable?Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecure Multi-party Computation: Information Flow of Outputs and Game TheoryA distributed protocol for privacy preserving aggregation with non-permanent participantsSecure Outsourced ComputationRate-Limited Secure Function Evaluation: Definitions and ConstructionsUniversally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsOn the exact round complexity of secure three-party computationGNUC: a new universal composability frameworkEfficient Secure Two-Party ExponentiationBetter Preprocessing for Secure Multiparty ComputationVerifiable Multi-party Computation with Perfectly Private Audit TrailNetwork Oblivious TransferFrom Passive to Covert Security at Low CostLower and Upper Bounds on the Randomness Complexity of Private Computations of ANDPractically Efficient Secure Single-Commodity Multi-market AuctionsHierarchical and dynamic threshold Paillier cryptosystem without trusted dealer






This page was built for publication: Secure Multiparty Computation Goes Live