Secure two-party computation

Results: 88



#Item
81Cryptography / Computing / Secure two-party computation / Communications protocol / Commitment scheme / Secure multi-party computation / Oblivious transfer / Port / Transmission Control Protocol / Cryptographic protocols / Data / Information

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
82Digital circuits / Cryptographic protocols / Mathematics / Computational complexity theory / Secure multi-party computation / Boolean circuit / Multiplexer / Circuit / Boolean algebra / Theoretical computer science / Computing / Algebraic logic

Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-07-02 10:26:47
83XOR gate / Circuit / XNOR gate / OR gate / Electronic circuit / Boolean circuit / Exclusive or / Verifiable computing / Theoretical computer science / Logic gates / Electronics

Secure Two-Party Computation is Practical Benny Pinkas1 , Thomas Schneider2 , Nigel P. Smart3 , and Stephen C. Williams3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-02 03:58:11
84Decision trees / Theoretical computer science / Secure multi-party computation / ID3 algorithm / Decision tree learning / ID3 / Secure two-party computation / Communication complexity / Oblivious transfer / Cryptographic protocols / Data / Information

Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-02-17 13:42:09
85Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
86YAK / Secure two-party computation / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptographic protocols / Data / Information

Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-23 17:30:48
87Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
88Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2011-04-04 06:52:20
UPDATE