A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. ... Our techniques start to improve upon existing protocols when there are around n = 20 parties with h = 6 honest parties, and as these increase we obtain up to a 13 times reduction (for n = 400, h = 120) ... We don't give further details of this ISD variant, but it uses four initial lists of size (k+q) Table of Contents of TinyKeys: A New Approach to Efficient Multi-Party Computation . . . . . . . . . . ...doi:10.1007/978-3-319-96878-0_1 fatcat:k7xjoou2ifcjvfol443kkblsrm
This approach exposes a unique external interface to access different applications lying behind the bus (or, in this approach, different middleware architectures). ... Based on a dynamic service composition model and a semantic knowledge management scheme, it provides an agent-based virtual sensor service approach that is able to create new composed services combining ...doi:10.3233/ais-150361 fatcat:kfbldsvzxvh7hilodrarbiekj4