Filters








5,201 Hits in 3.6 sec

Non-Interactive Secure Multiparty Computation [chapter]

Amos Beimel, Ariel Gabizon, Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Anat Paskin-Cherniavsky
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We introduce and study the notion of non-interactive secure multiparty computation (  ...  Consider the following non-interactive scenario for secure multiparty computation.  ...  Introduction We introduce and study the notion of non-interactive secure multiparty computation (NIMPC).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_22">doi:10.1007/978-3-662-44381-1_22</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/izeviusiubgeviobh5zteqywoi">fatcat:izeviusiubgeviobh5zteqywoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160309201157/http://eprint.iacr.org/2014/960.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/f2/f1f2c1b72d8be72d0c4366cf23d6609707678d0f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44381-1_22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the (in)efficiency of non-interactive secure multiparty computation

Maki Yoshida, Satoshi Obana
<span title="2018-03-26">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
Secure multi-party computation (MPC) enables multiple players to cooperatively evaluate various functions in the presence of adversaries.  ...  In this paper, we consider non-interactive MPC (NIMPC) against honest-but-curious adversaries in the informationtheoretic setting, which was introduced by Beimel et al. at CRYPTO 2014.  ...  A non-interactive secure MPC (NIMPC) protocol for H is a triplet Π = (GEN, ENC, DEC) where -GEN : H → R 1 × · · · × R n is a randomized function, -ENC is an n-tuple of deterministic functions (ENC 1 ,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-017-0424-7">doi:10.1007/s10623-017-0424-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6xdvgvyconhlzb63hw4rce76ee">fatcat:6xdvgvyconhlzb63hw4rce76ee</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502100404/https://link.springer.com/content/pdf/10.1007%2Fs10623-017-0424-7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/51/a951604179ddc7ab929600a3f32d3d0ebe5eaf2f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-017-0424-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Non-Interactive Secure Multiparty Key Establishment

Sigurd Eskeland
<span title="2014-09-01">2014</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ndvm4yozfbhtvjxfiowlwtdbty" style="color: black;">Tatra Mountains Mathematical Publications</a> </i> &nbsp;
In this paper, we present a simple and straightforward efficient non-interactive group-oriented key establishment scheme that provides off-line computation of secret group keys, without computations and  ...  In any case, such protocols provide secure establishment of group-oriented cryptographic keys, but with the costs of multiple transmissions of key establishment messages and in some cases multiple secret  ...  A user key generation scheme for non-interactive secure multiparty computations In this section, we present a new user key generation scheme, whose user keys are part of the non-interactive multiparty  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/tmmp-2014-0024">doi:10.2478/tmmp-2014-0024</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yyzipnfjbfh33o7z7eqkgdo6ru">fatcat:yyzipnfjbfh33o7z7eqkgdo6ru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722103454/https://content.sciendo.com/downloadpdf/journals/tmmp/60/1/article-p47.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/c6/c8c6330e978c2b8bccc2ba6005f12b6e362f9121.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/tmmp-2014-0024"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Hybrid Quantum Protocols for Secure Multiparty Summation and Multiplication

Kartick Sutradhar, Hari Om
<span title="2020-06-04">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tnqhc2x2aneavcd3gx5h7mswhm" style="color: black;">Scientific Reports</a> </i> &nbsp;
The summation and multiplication are two basic operations for secure multiparty quantum computation.  ...  The existing secure multiparty quantum summation and multiplication protocols have (n, n) threshold approach and their computation type is bit-by-bit, where n is total number of players.  ...  They have better communication and computation costs as the type of computation is secret-by-secret.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-020-65871-8">doi:10.1038/s41598-020-65871-8</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32499534">pmid:32499534</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/exlvamhyebfjtmakwvn53bggj4">fatcat:exlvamhyebfjtmakwvn53bggj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107233601/https://www.nature.com/articles/s41598-020-65871-8.pdf?error=cookies_not_supported&amp;code=7af6bbfb-ed99-47b9-a86c-2b5a5d76a180" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/19/611913602b64bc93e6403f1dba7510838743886a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-020-65871-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data

Rafael DOWSLEY, Jörn MÜLLER-QUADE, Akira OTSUKA, Goichiro HANAOKA, Hideki IMAI, Anderson C.A. NASCIMENTO
<span title="">2011</span> <i title="Institute of Electronics, Information and Communications Engineers (IEICE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x2mklbxoqjfvjdjrdybgo53sdm" style="color: black;">IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences</a> </i> &nbsp;
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data pre-distributed by a trusted authority.  ...  As an application of this VSS scheme we present very efficient unconditionally secure protocols for performing multiplication of shares based on pre-distributed data which generalize two-party computations  ...  is only computationally secure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transfun.e94.a.725">doi:10.1587/transfun.e94.a.725</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ivbfasxkqzg57fyhd7crwjzwvq">fatcat:ivbfasxkqzg57fyhd7crwjzwvq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130303041655/http://eprint.iacr.org/2009/273.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/96/b896ea574b2400e9b8d06fb74020e222265510cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1587/transfun.e94.a.725"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

Gilad Asharov, Gil Segev
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v4uclqixrrhlnk5pbw4wii6cfq" style="color: black;">2015 IEEE 56th Annual Symposium on Foundations of Computer Science</a> </i> &nbsp;
random oracles [HSW14] • Multi-input functional encryption [GGG+14, AJ15] • Functional encryption for randomized functionalities [GJK+15] • Adaptively-secure multiparty computation [GGH+14a,  ...  ingredient • Public-key encryption, short "hash- and-sign" signatures, CCA-secure public-key encryption, non- interactive zero-knowledge proofs, Injective trapdoor functions, oblivious transfer [SW14  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/focs.2015.21">doi:10.1109/focs.2015.21</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/focs/AsharovS15.html">dblp:conf/focs/AsharovS15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f4doowce6rdkzh7e4h7qw5pkna">fatcat:f4doowce6rdkzh7e4h7qw5pkna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151217125823/http://www.cs.huji.ac.il/~asharov/slides/AS15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/25/f4258c154c17c189ee7319573497aa9a85013ba4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/focs.2015.21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

Gilad Asharov, Gil Segev
<span title="">2016</span> <i title="Society for Industrial &amp; Applied Mathematics (SIAM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7dys7zoberdktmxyjciuy5bnse" style="color: black;">SIAM journal on computing (Print)</a> </i> &nbsp;
random oracles [HSW14] • Multi-input functional encryption [GGG+14, AJ15] • Functional encryption for randomized functionalities [GJK+15] • Adaptively-secure multiparty computation [GGH+14a,  ...  ingredient • Public-key encryption, short "hash- and-sign" signatures, CCA-secure public-key encryption, non- interactive zero-knowledge proofs, Injective trapdoor functions, oblivious transfer [SW14  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/15m1034064">doi:10.1137/15m1034064</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mpwjp5fvhnbxzgxq3dlvy27vfe">fatcat:mpwjp5fvhnbxzgxq3dlvy27vfe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151217125823/http://www.cs.huji.ac.il/~asharov/slides/AS15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/25/f4258c154c17c189ee7319573497aa9a85013ba4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1137/15m1034064"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secured Friending in Proximity based Mobile Social Network

Y Vidya, B Shemimol
<span title="2015-12-28">2015</span> <i title="DJ Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2eolhhty2jacfef7mttp22dvri" style="color: black;">Journal of excellence in Computer Science and Engineering</a> </i> &nbsp;
The basic function is to find friends in close proximity with matching profiles securely which is crucial.  ...  Evaluation using real data and actual implementation shows that this mechanism improves security and is privacy preserving, verifiable and efficient.  ...  Multiparty Computation (SMC) and Shamir Secret share schemes(SS) for efficient computation and communication.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18831/djcse.in/2015021001">doi:10.18831/djcse.in/2015021001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s6zpfp7emjfw5ncbabv4mstape">fatcat:s6zpfp7emjfw5ncbabv4mstape</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602085726/http://www.djcse.in//files/publish/10.18831djcse.in2015021001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/a2/a4a2eb3978633fc4ae3c5bc63dd41a15ddd4285a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18831/djcse.in/2015021001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Minimal-Latency Secure Function Evaluation [chapter]

Donald Beaver
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in N C 1 . In  ...  Multiparty Secure Computation With the pyramid data structure in place, we are now ready to give a multiparty secure computation for N C 1 . Latency vs.  ...  The calculation of not at level 0 is simple: non-interactively compute 1 − x secretly.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_23">doi:10.1007/3-540-45539-6_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l6ny24pix5ey3j4dpvyty3u3ym">fatcat:l6ny24pix5ey3j4dpvyty3u3ym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150429224358/http://www.iacr.org/archive/eurocrypt2000/1807/18070340-new.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/f3/f1f37c30788c6ee72d162051b3ab2047152607ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-45539-6_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An efficient simulation for quantum secure multiparty computation

Kartick Sutradhar, Hari Om
<span title="2021-01-26">2021</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tnqhc2x2aneavcd3gx5h7mswhm" style="color: black;">Scientific Reports</a> </i> &nbsp;
AbstractThe quantum secure multiparty computation is one of the important properties of secure quantum communication.  ...  In this paper, we propose a quantum secure multiparty summation (QSMS) protocol based on (t, n) threshold approach, which can be used in many complex quantum operations.  ...  An efficient simulation for quantum secure multiparty computation Kartick Sutradhar * & Hari Om The quantum secure multiparty computation is one of the important properties of secure quantum communication  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-021-81799-z">doi:10.1038/s41598-021-81799-z</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/33500501">pmid:33500501</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7838208/">pmcid:PMC7838208</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zvavyczhjfaxznbxvp5pbsnmsy">fatcat:zvavyczhjfaxznbxvp5pbsnmsy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429092710/https://www.nature.com/articles/s41598-021-81799-z.pdf?error=cookies_not_supported&amp;code=debdc3ac-8cb3-4eb8-b698-a73e8afe1ae3" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/e9/07e93a7eb29f45b1c6267d0825ee9912faa0d1d1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1038/s41598-021-81799-z"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7838208" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Mix and Match: Secure Function Evaluation via Ciphertexts [chapter]

Markus Jakobsson, Ari Juels
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We introduce a novel approach to general secure multiparty computation that avoids the intensive use of verifiable secret sharing characterizing nearly all previous protocols in the literature.  ...  Thus, as another contribution in this paper, we present a practical, mix-and-match-based auction protocol that is fully private and non-interactive and may be readily adapted to a wide range of auction  ...  Computation of this sort involving two or more players is known as secure multiparty computation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44448-3_13">doi:10.1007/3-540-44448-3_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d3ytgko3gfcoplr72ohedmeefu">fatcat:d3ytgko3gfcoplr72ohedmeefu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728194415/https://link.springer.com/content/pdf/10.1007%2F3-540-44448-3_13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/52/4852774e0fc60ffdb7f8f59d62fe363e04628cc8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-44448-3_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems [chapter]

Berry Schoenmakers, Meilof Veeningen
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We also develop a multiparty protocol for jointly producing non-interactive zero-knowledge proofs, which may be of independent interest.  ...  In this paper, we propose a new security model for universally verifiable multiparty computation, and we present a practical construction, based on a threshold homomorphic cryptosystem.  ...  Multiparty Non-Interactive Proofs In this section, we show how to produce non-interactive zero-knowledge proofs in a multiparty way.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-28166-7_1">doi:10.1007/978-3-319-28166-7_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bikukz4nqbcxfeo7dg2ww76nne">fatcat:bikukz4nqbcxfeo7dg2ww76nne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160730031410/http://eprint.iacr.org/2015/058.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/02/d402489726e0238a1cd1e2c489d613b499fc863e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-28166-7_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Ownership Proofs of Digital Works Based on Secure Multiparty Computation

Yan ZHU
<span title="">2006</span> <i title="China Science Publishing &amp; Media Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zwqx233xnvggdgdmdkqawwikpy" style="color: black;">Journal of Software (Chinese)</a> </i> &nbsp;
Ownership proofs of digital works based on secure multiparty computation. Journal of Software, 2006,17(1):157−166.  ...  This paper proposes an ownership proofs scheme for digital works based on proactive verifiable secret sharing and secure multiparty computation.  ...  Secure multiparty computation Secure Multiparty computation is a cryptographic task that allows a group of participants to emulate any trusted party protocol [5] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1360/jos170157">doi:10.1360/jos170157</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kiip6bzbh5hzpkno5hz3bfvvgy">fatcat:kiip6bzbh5hzpkno5hz3bfvvgy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809035125/http://www.jos.org.cn/1000-9825/17/157.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e4/73/e473584af71e70cc9417077b6baff03facbf5b76.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1360/jos170157"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Model-Based Approach to Secure Multiparty Distributed Systems [chapter]

Najah Ben Said, Takoua Abdellatif, Saddek Bensalem, Marius Bozga
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Unlike existing methods dealing with verification of low-level cryptographic protocols, we propose a novel model-based approach based on model transformations to build a secure-by-construction multiparty  ...  Within distributed systems with completely distributed interactions between parties with mutual distrust, it is hard to control the (illicit) flowing of private information to unintended parties.  ...  However, access control is insufficient to regulate the propagation of information once released for processing by a program especially with non-trivial interactions and computations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-47166-2_62">doi:10.1007/978-3-319-47166-2_62</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r5ykgo7yjrhvxnp5rtrjgex5au">fatcat:r5ykgo7yjrhvxnp5rtrjgex5au</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190502074554/https://hal.archives-ouvertes.fr/hal-01865293/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/6f/1e6f8da6b559e380e279a21ca7bab99cb29f0115.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-47166-2_62"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Computing on Encrypted Data [chapter]

Amit Sahai
<span title="">2008</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Here, we explore this question in a number of settings, focusing on how interaction and secure hardware can help us compute on encrypted data, and what can be done if we have neither interaction nor secure  ...  Encryption secures our stored data but seems to make it inert. Can we process encrypted data without having to decrypt it first?  ...  and multiparty computation [24, 11, 3, 6] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-89862-7_12">doi:10.1007/978-3-540-89862-7_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kn7akblwm5hgtln3opwixkifyq">fatcat:kn7akblwm5hgtln3opwixkifyq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401063859/http://www.cs.ucla.edu/~sahai/work/web/2008%20Publications/ICISS2008.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/c5/80c5514b1c3b9658c16332360cc8e9aa41367a39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-89862-7_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 5,201 results