Journal articles on the topic 'Secure multi-party protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure multi-party protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Das, Nayana, and Goutam Paul. "Secure multi-party quantum conference and XOR computation." quantum Information and Computation 21, no. 3&4 (March 2021): 0203–32. http://dx.doi.org/10.26421/qic21.3-4-2.
Full textPitalúa-García, Damián. "Unconditionally secure relativistic multi-party biased coin flipping and die rolling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2252 (August 2021): 20210203. http://dx.doi.org/10.1098/rspa.2021.0203.
Full textGordon, S. Dov, Carmit Hazay, and Phi Hung Le. "Fully Secure PSI via MPC-in-the-Head." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 291–313. http://dx.doi.org/10.56553/popets-2022-0073.
Full textLu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (January 17, 2024): 80. http://dx.doi.org/10.3390/e26010080.
Full textRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Full textWang, Ning, Xinying Tian, Xiaodong Zhang, and Song Lin. "Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption." Photonics 10, no. 5 (May 10, 2023): 558. http://dx.doi.org/10.3390/photonics10050558.
Full textAlper, Handan Kılınç, and Alpteki̇n Küpçü. "Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation." ACM Transactions on Privacy and Security 25, no. 1 (February 28, 2022): 1–34. http://dx.doi.org/10.1145/3477530.
Full textSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (October 14, 2020): 1152. http://dx.doi.org/10.3390/e22101152.
Full textZhu, Zong-Wu, and Ru-Wei Huang. "A secure multi-party computation protocol without CRS supporting multi-bit encryption." PLOS ONE 17, no. 3 (March 18, 2022): e0265572. http://dx.doi.org/10.1371/journal.pone.0265572.
Full textShmueli, Erez, and Tamir Tassa. "Mediated Secure Multi-Party Protocols for Collaborative Filtering." ACM Transactions on Intelligent Systems and Technology 11, no. 2 (March 2, 2020): 1–25. http://dx.doi.org/10.1145/3375402.
Full textDa-Wei Zhou, Da-Wei Zhou, Su-Zhen Cao Da-Wei Zhou, Xiao Zhao Su-Zhen Cao, Dan-Dan Xing Xiao Zhao, and Zheng Wang Dan-Dan Xing. "Efficient First-price Sealed E-auction Protocol Under Secure Multi-party Computational Malicious Model." 電腦學刊 35, no. 1 (February 2024): 065–81. http://dx.doi.org/10.53106/199115992024023501005.
Full textWang, Hong, and Shi Min Wei. "Secure Distributed Computation in the Exponent." Advanced Materials Research 217-218 (March 2011): 994–1000. http://dx.doi.org/10.4028/www.scientific.net/amr.217-218.994.
Full textSeo, Minhye. "Fair and Secure Multi-Party Computation with Cheater Detection." Cryptography 5, no. 3 (August 12, 2021): 19. http://dx.doi.org/10.3390/cryptography5030019.
Full textZhi-Gang, Gan. "Improvement of Quantum Protocols for Secure Multi-Party Summation." International Journal of Theoretical Physics 59, no. 10 (August 16, 2020): 3086–92. http://dx.doi.org/10.1007/s10773-020-04555-5.
Full textAlghamdi, Wajdi, Reda Salama, M. Sirija, Ahmed Radie Abbas, and Kholmurodova Dilnoza. "Secure Multi-Party Computation for Collaborative Data Analysis." E3S Web of Conferences 399 (2023): 04034. http://dx.doi.org/10.1051/e3sconf/202339904034.
Full textFeng, Dengguo, and Kang Yang. "Concretely efficient secure multi-party computation protocols: survey and more." Security and Safety 1 (2022): 2021001. http://dx.doi.org/10.1051/sands/2021001.
Full textBraun, Lennart, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. "MOTION – A Framework for Mixed-Protocol Multi-Party Computation." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–35. http://dx.doi.org/10.1145/3490390.
Full textChen, Chang, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, and Jin Li. "Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols." Cryptography 8, no. 1 (February 4, 2024): 6. http://dx.doi.org/10.3390/cryptography8010006.
Full textZheng, Qiang, Shou Shan Luo, and Yang Xin. "Research on the Secure Multi-Party Computation of some Linear Algebra Problems." Applied Mechanics and Materials 20-23 (January 2010): 265–70. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.265.
Full textKumari, Surabhi. "Efficient and Secure Multi-party Computation for Heterogeneous Environment." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 911–17. http://dx.doi.org/10.22214/ijraset.2021.38932.
Full textVijaya Kumar, A., N. J.V.Vineetha, P. Sai Chakradar, and K. Kalyan Sai. "Enhancement of security in cloud computing with secure multi-party computation." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 339. http://dx.doi.org/10.14419/ijet.v7i1.1.9848.
Full textXie, Dong Qing, and Chun Ming Tang. "Electronic Protocols for Voting and Bidding Based on Secure Multi-Party Proof." Advanced Materials Research 171-172 (December 2010): 305–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.305.
Full textYogi, Manas Kumar, and Yamuna Mundru. "Genomic Data Analysis with Variant of Secure Multi-Party Computation Technique." December 2023 5, no. 4 (December 2023): 450–70. http://dx.doi.org/10.36548/jtcsst.2023.4.006.
Full textCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus, and Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting." Entropy 23, no. 8 (July 31, 2021): 1001. http://dx.doi.org/10.3390/e23081001.
Full textBroadnax, Brandon, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, and Matthias Nagel. "Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 312–38. http://dx.doi.org/10.2478/popets-2021-0072.
Full textLu, Donghang, Albert Yu, Aniket Kate, and Hemanta Maji. "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 396–416. http://dx.doi.org/10.2478/popets-2022-0020.
Full textSaxena, Ashwin, Kishore Thapliyal, and Anirban Pathak. "Continuous variable controlled quantum dialogue and secure multiparty quantum computation." International Journal of Quantum Information 18, no. 04 (June 2020): 2050009. http://dx.doi.org/10.1142/s0219749920500094.
Full textRoy, Amit Kumar, Keshab Nath, Gautam Srivastava, Thippa Reddy Gadekallu, and Jerry Chun-Wei Lin. "Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks." Sensors 22, no. 5 (March 2, 2022): 1958. http://dx.doi.org/10.3390/s22051958.
Full textXin Liu, Xin Liu, Yang Xu Xin Liu, Gang Xu Yang Xu, Xiu-Bo Chen Gang Xu, and Yu-Ling Cheng Xiu-Bo Chen. "Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications." 網際網路技術學刊 23, no. 5 (September 2022): 1019–27. http://dx.doi.org/10.53106/160792642022092305010.
Full textSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Full textVijaya Kumar, A., and L. S. S. Reddy. "A critical review on application of secure multi party computation protocols in cloud environment." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 363. http://dx.doi.org/10.14419/ijet.v7i2.7.10720.
Full textLi, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (October 8, 2022): 1433. http://dx.doi.org/10.3390/e24101433.
Full textBaum, Carsten, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, and Juan Ramón Troncoso-Pastoriza. "Efficient protocols for oblivious linear function evaluation from ring-LWE1." Journal of Computer Security 30, no. 1 (January 20, 2022): 39–78. http://dx.doi.org/10.3233/jcs-200116.
Full textWagh, Sameer. "Pika: Secure Computation using Function Secret Sharing over Rings." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 351–77. http://dx.doi.org/10.56553/popets-2022-0113.
Full textLiu, Xin, Xiaomeng Liu, Ruiling Zhang, Dan Luo, Gang Xu, and Xiubo Chen. "Securely Computing the Manhattan Distance under the Malicious Model and Its Applications." Applied Sciences 12, no. 22 (November 17, 2022): 11705. http://dx.doi.org/10.3390/app122211705.
Full textHassan, Mohammad R., Feras A. Alnaimait, Qasem Kharma, Ashraf Sharah, and Khalil H. Al-Shqeerat. "Secure Group Key Management Protocol for Grid Computing." Webology 18, no. 2 (December 23, 2021): 1055–65. http://dx.doi.org/10.14704/web/v18i2/web18374.
Full textRoche, Thomas, and Emmanuel Prouff. "Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols." Journal of Cryptographic Engineering 2, no. 2 (June 15, 2012): 111–27. http://dx.doi.org/10.1007/s13389-012-0033-3.
Full textBlanton, Marina, Dennis Murphy, and Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Full textHe, Guang Ping. "An Optical Implementation of Quantum Bit Commitment Using Infinite-Dimensional Systems." Applied Sciences 13, no. 13 (June 29, 2023): 7692. http://dx.doi.org/10.3390/app13137692.
Full textLi, Lei, and Zhi Li. "An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure." Entropy 25, no. 2 (January 31, 2023): 265. http://dx.doi.org/10.3390/e25020265.
Full textCui, Jianming, Xiaojun Zhang, Ning Cao, Dexue Zhang, Jianrui Ding, and Guofu Li. "An improved authentication protocol–based dynamic identity for multi-server environments." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877765. http://dx.doi.org/10.1177/1550147718777654.
Full textEdemacu, Kennedy, and Jong Wook Kim. "Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations." Mathematics 10, no. 13 (June 23, 2022): 2185. http://dx.doi.org/10.3390/math10132185.
Full textSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón, and Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Full textMishra, Abhishek. "Privacy-Preserving Data Sharing Platform." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 29, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem32225.
Full textTrieu Quang Phong. "Constructing efficient and secure batch signature schemes." Journal of Military Science and Technology, CSCE5 (December 15, 2021): 49–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce5.2021.49-60.
Full textAttrapadung, Nuttapong, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, and Jacob C. N. Schuldt. "Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 746–67. http://dx.doi.org/10.56553/popets-2022-0131.
Full textFan, Cunqun, Peiheng Jia, Manyun Lin, Lan Wei, Peng Guo, Xiangang Zhao, and Ximeng Liu. "Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption." Mathematics 11, no. 8 (April 8, 2023): 1784. http://dx.doi.org/10.3390/math11081784.
Full textDemmler, Daniel. "Towards practical privacy-preserving protocols." it - Information Technology 64, no. 1-2 (April 1, 2022): 49–53. http://dx.doi.org/10.1515/itit-2022-0005.
Full textC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics." Journal of Electrical Systems 20, no. 5s (April 13, 2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Full textMd Fahim Ahammed and Md Rasheduzzaman Labu. "Privacy-Preserving Data Sharing in Healthcare: Advances in Secure Multiparty Computation." Journal of Medical and Health Studies 5, no. 2 (April 7, 2024): 37–47. http://dx.doi.org/10.32996/jmhs.2024.5.2.4.
Full text