Auswahl der wissenschaftlichen Literatur zum Thema „Secure multi-party protocols“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Secure multi-party protocols" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Secure multi-party protocols"
Das, Nayana, und Goutam Paul. „Secure multi-party quantum conference and XOR computation“. quantum Information and Computation 21, Nr. 3&4 (März 2021): 0203–32. http://dx.doi.org/10.26421/qic21.3-4-2.
Der volle Inhalt der QuellePitalúa-García, Damián. „Unconditionally secure relativistic multi-party biased coin flipping and die rolling“. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, Nr. 2252 (August 2021): 20210203. http://dx.doi.org/10.1098/rspa.2021.0203.
Der volle Inhalt der QuelleGordon, S. Dov, Carmit Hazay und Phi Hung Le. „Fully Secure PSI via MPC-in-the-Head“. Proceedings on Privacy Enhancing Technologies 2022, Nr. 3 (Juli 2022): 291–313. http://dx.doi.org/10.56553/popets-2022-0073.
Der volle Inhalt der QuelleLu, Yaohua, und Gangyi Ding. „Quantum Secure Multi-Party Summation with Graph State“. Entropy 26, Nr. 1 (17.01.2024): 80. http://dx.doi.org/10.3390/e26010080.
Der volle Inhalt der QuelleRao, Ch Koteswara, Kunwar Singh und Anoop Kumar. „Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation“. Journal of High Speed Networks 27, Nr. 1 (29.03.2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Der volle Inhalt der QuelleWang, Ning, Xinying Tian, Xiaodong Zhang und Song Lin. „Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption“. Photonics 10, Nr. 5 (10.05.2023): 558. http://dx.doi.org/10.3390/photonics10050558.
Der volle Inhalt der QuelleAlper, Handan Kılınç, und Alpteki̇n Küpçü. „Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation“. ACM Transactions on Privacy and Security 25, Nr. 1 (28.02.2022): 1–34. http://dx.doi.org/10.1145/3477530.
Der volle Inhalt der QuelleSun, Xin, Piotr Kulicki und Mirek Sopek. „Multi-Party Quantum Byzantine Agreement without Entanglement“. Entropy 22, Nr. 10 (14.10.2020): 1152. http://dx.doi.org/10.3390/e22101152.
Der volle Inhalt der QuelleZhu, Zong-Wu, und Ru-Wei Huang. „A secure multi-party computation protocol without CRS supporting multi-bit encryption“. PLOS ONE 17, Nr. 3 (18.03.2022): e0265572. http://dx.doi.org/10.1371/journal.pone.0265572.
Der volle Inhalt der QuelleShmueli, Erez, und Tamir Tassa. „Mediated Secure Multi-Party Protocols for Collaborative Filtering“. ACM Transactions on Intelligent Systems and Technology 11, Nr. 2 (02.03.2020): 1–25. http://dx.doi.org/10.1145/3375402.
Der volle Inhalt der QuelleDissertationen zum Thema "Secure multi-party protocols"
Boyle, Elette Chantae. „Secure multi-party protocols under a modern lens“. Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82436.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (p. 263-272).
A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly evaluate f over their private inputs, such that a computationally bounded adversary who corrupts a subset of the parties can not learn anything beyond the inputs of the corrupted parties and the output of the function f. General MPC completeness theorems in the 1980s showed that every efficiently computable function can be evaluated securely in this fashion [Yao86, GMW87, CCD87, BGW88] using the existence of cryptography. In the following decades, progress has been made toward making MPC protocols efficient enough to be deployed in real-world applications. However, recent technological developments have brought with them a slew of new challenges, from new security threats to a question of whether protocols can scale up with the demand of distributed computations on massive data. Before one can make effective use of MPC, these challenges must be addressed. In this thesis, we focus on two lines of research toward this goal: " Protocols resilient to side-channel attacks. We consider a strengthened adversarial model where, in addition to corrupting a subset of parties, the adversary may leak partial information on the secret states of honest parties during the protocol. In presence of such adversary, we first focus on preserving the correctness guarantees of MPC computations. We then proceed to address security guarantees, using cryptography. We provide two results: an MPC protocol whose security provably "degrades gracefully" with the amount of leakage information obtained by the adversary, and a second protocol which provides complete security assuming a (necessary) one-time preprocessing phase during which leakage cannot occur. * Protocols with scalable communication requirements. We devise MPC protocols with communication locality: namely, each party only needs to communicate with a small (polylog) number of dynamically chosen parties. Our techniques use digital signatures and extend particularly well to the case when the function f is a sublinear algorithm whose execution depends on o(n) of the n parties' inputs.
by Elette Chantae Boyle.
Ph.D.
Colbeck, Roger Andrew. „Quantum and relativistic protocols for secure multi-party computation“. Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612940.
Der volle Inhalt der QuelleZhou, Yanliang. „Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols“. Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.
Der volle Inhalt der QuelleMusic, Luka. „Multi-Party Quantum Cryptography : from Folklore to Real-World“. Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.
Der volle Inhalt der QuelleQuantum cryptography builds upon decades of advances both in classical cryptography and networks. However, contrary to its classical counterparts, it is still in its infancy applicability-wise, even in the scenario where powerful quantum computers are readily available, and more theoretical work is required before it can provide concrete benefits. The first goal is to formalise in rigorous quantum security frameworks the properties of various techniques that have been transposed, often without proper justification, from the classical world.Then, the recent developments in quantum technologies suggest a mostly cloud-based future availability of quantum devices. Therefore, quantum computation and communication cost of protocol participants must be lowered before being useful.Finally, in most situations, additional steps need to be taken to tailor protocols to the specifications of devices. This allows for optimisations both in terms of quantum memory and operation requirements.This thesis contributes to these three aspects by: (i) giving the first general security definition of the Quantum Cut-and-Choose, a technique for proving the correctness of a quantum message; (ii) presenting a more realistic framework of security against superposition attacks, where classical protocols run on inherently quantum devices; (iii) constructing an efficient delegated multi-party quantum computation protocol, allowing clients to delegate securely to a quantum server a private computation; (iv) building a method for verifying the honesty of a quantum server performing computations on behalf of a client with no operation or memory overhead compared to the unprotected computation
Lin, Wenjie. „Secure Multi-party Authorization in Clouds“. The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.
Der volle Inhalt der QuelleTurban, Tiina. „A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme“. Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25874.
Der volle Inhalt der QuelleZhang, Ping Echo, und 张萍. „Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617898.
Der volle Inhalt der Quellepublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Huang, Wen Kai, und 黃文楷. „A Protocol Description Language for Secure Multi-Party Computation“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/57221064473475505376.
Der volle Inhalt der Quelle國立政治大學
資訊科學學系
99
Protocols for secure multi-party computation (SMC) allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. In the past two years, we developed an SMC implementation framework for both integers and floating numbers which comprises a set of arithmetic operations that manipulate secret values among involved parties using the scalar product protocol as the basis. Such a library of arithmetic operations is call building blocks. But using this library is not easy. To solve individual SMC problem, programmer should knowing the given framework and protocol detail very well. This difficulty makes them won't consider this framework while facing the need of SMC. To ease the writing of more complex user-defined protocols, using the technique of domain-specific language, this thesis analysis the general needs of SMC, develop a domain-specific language of SMC, and implement a compiler that coverts this language to SMC code, which is executable code composed of the protocols of given framework. We called this language Protocol Description Language, PDL.
Ajith, S. „Fast Actively Secure OT Extension for Short Secrets“. Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3623.
Der volle Inhalt der QuelleAjith, S. „Fast Actively Secure OT Extension for Short Secrets“. Thesis, 2017. http://etd.iisc.ernet.in/2005/3623.
Der volle Inhalt der QuelleBücher zum Thema "Secure multi-party protocols"
Bîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. Secure Multi-Party E-Commerce Protocols. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1.
Der volle Inhalt der QuelleLindell, Yehuda. Composition of Secure Multi-Party Protocols. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13246.
Der volle Inhalt der QuelleOnieva, José A., Javier Lopez und Jianying Zhou. Secure Multi-Party Non-Repudiation Protocols and Applications. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-75630-1.
Der volle Inhalt der QuelleCătălin V. Bîrjoveanu und Mirela Bîrjoveanu. Secure Multi-Party e-Commerce Protocols. Springer International Publishing AG, 2022.
Den vollen Inhalt der Quelle findenZhou, Jianying, und José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2008.
Den vollen Inhalt der Quelle findenZhou, Jianying, und José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2010.
Den vollen Inhalt der Quelle findenLindell, Yehuda. Composition of Secure Multi-Party Protocols: A Comprehensive Study. Springer London, Limited, 2003.
Den vollen Inhalt der Quelle findenComposition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science). Springer, 2003.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Secure multi-party protocols"
Merino, Louis-Henri, und José Cabrero-Holgueras. „Secure Multi-Party Computation“. In Trends in Data Protection and Encryption Technologies, 89–92. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.
Der volle Inhalt der QuelleBîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. „Two-Party E-Commerce Protocols“. In Secure Multi-Party E-Commerce Protocols, 15–42. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_2.
Der volle Inhalt der QuelleLindell, Yehuda. „3. Secure Computation without Agreement“. In Composition of Secure Multi-Party Protocols, 45–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_3.
Der volle Inhalt der QuelleLindell, Yehuda. „4. Universally Composable Multi-party Computation“. In Composition of Secure Multi-Party Protocols, 81–184. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_4.
Der volle Inhalt der QuelleLindell, Yehuda. „1. Introduction“. In Composition of Secure Multi-Party Protocols, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_1.
Der volle Inhalt der QuelleLindell, Yehuda. „2. The Composition of Authenticated Byzantine Agreement“. In Composition of Secure Multi-Party Protocols, 21–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_2.
Der volle Inhalt der QuelleBîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. „Conclusions“. In Secure Multi-Party E-Commerce Protocols, 107–9. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_6.
Der volle Inhalt der QuelleBîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. „Multi-party E-Commerce Protocols for Complex Transactions“. In Secure Multi-Party E-Commerce Protocols, 43–63. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_3.
Der volle Inhalt der QuelleBîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. „Formal Verification of Multi-party Fair Exchange E-Commerce Protocols“. In Secure Multi-Party E-Commerce Protocols, 81–106. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_5.
Der volle Inhalt der QuelleBîrjoveanu, Cătălin V., und Mirela Bîrjoveanu. „Introduction“. In Secure Multi-Party E-Commerce Protocols, 1–13. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_1.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Secure multi-party protocols"
Aljumah, Feras, Andrei Soeanu, Wen Ming Liu und Mourad Debbabi. „Protocols for secure multi-party private function evaluation“. In 2015 First International Conference on Anti-Cybercrime (ICACC). IEEE, 2015. http://dx.doi.org/10.1109/anti-cybercrime.2015.7351946.
Der volle Inhalt der QuelleShmueli, Erez, und Tamir Tassa. „Secure Multi-Party Protocols for Item-Based Collaborative Filtering“. In RecSys '17: Eleventh ACM Conference on Recommender Systems. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3109859.3109881.
Der volle Inhalt der QuelleLuo, Wenjun, und Xiang Li. „A study of secure multi-party elementary function computation protocols“. In the 3rd international conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1046290.1046293.
Der volle Inhalt der QuelleMovahedi, Mahnush, Jared Saia und Mahdi Zamani. „Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling“. In 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2015. http://dx.doi.org/10.1109/icdcs.2015.116.
Der volle Inhalt der QuellePinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf und Anderson C. A. Nascimento. „Universally Composable Committed Oblivious Transfer With A Trusted Initializer“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Der volle Inhalt der QuellePettai, Martin, und Peeter Laud. „Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries“. In 2015 IEEE 28th Computer Security Foundations Symposium (CSF). IEEE, 2015. http://dx.doi.org/10.1109/csf.2015.13.
Der volle Inhalt der QuelleKerschbaum, Florian, Daniel Dahlmeier, Axel Schröpfer und Debmalya Biswas. „On the practical importance of communication complexity for secure multi-party computation protocols“. In the 2009 ACM symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1529282.1529730.
Der volle Inhalt der QuelleLiu, Wen, Shou-shan Luo und Yong-bin Wang. „Secure Multi-Party Comparing Protocol Based on Multi-Threshold Secret Sharing Scheme“. In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601327.
Der volle Inhalt der QuelleShi, Lei, Yonglong Luo und Caiyun Zhang. „Secure Two-Party Multi-Dimensional Vector Comparison Protocol“. In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302846.
Der volle Inhalt der QuelleXiao, Haiyan, und Xiaoyuan Yang. „Secure Multi-party Confidential Protocol of Matrix Factorization“. In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.89.
Der volle Inhalt der Quelle