<--- Back to Details
First PageDocument Content
Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation
Date: 2014-06-25 08:00:47
Cryptography
Secure multi-party computation
Secret sharing
Public-key cryptography
Universal composability
Communications protocol
Cryptographic protocol
Cartesian coordinate system
Transmission Control Protocol
Secure two-party computation

Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

Add to Reading List

Source URL: work.debayangupta.com

Download Document from Source Website

File Size: 668,10 KB

Share Document on Facebook

Similar Documents

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

DocID: 1xUA8 - View Document

Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

DocID: 1xTf5 - View Document

Homework 1 Cryptography CS 598 : Spring 2016 Released: Thu Jan 21 Due: Tue Feb 2 Exercise on Secret Sharing

Homework 1 Cryptography CS 598 : Spring 2016 Released: Thu Jan 21 Due: Tue Feb 2 Exercise on Secret Sharing

DocID: 1vnNK - View Document

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices Erinn Atwater and Ian Goldberg University of Waterloo, Ontario, Canada {erinn.atwater,iang}@uwaterloo.ca

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices Erinn Atwater and Ian Goldberg University of Waterloo, Ontario, Canada {erinn.atwater,iang}@uwaterloo.ca

DocID: 1uO4X - View Document

1  Secret Sharing with Optimal Decoding and Repair Bandwidth Wentao Huang and Jehoshua Bruck

1 Secret Sharing with Optimal Decoding and Repair Bandwidth Wentao Huang and Jehoshua Bruck

DocID: 1uIPQ - View Document