نتایج جستجو برای: secure multiparty computation

تعداد نتایج: 197740  

2009
Ivan Damg̊ard Marcel Keller

We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expected 70 + 20 255 rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive secu...

Journal: :JoWUA 2013
Sedigheh Abbasi Stelvio Cimato Ernesto Damiani

Secure Multiparty Computation (SMC) is well-known to have serious scalability issues. In fact, in spite of many significant achievements reported in SMC literature, SMC protocols are seldom efficiently scalable to real-world applications. In this paper we propose a new scheme, called Secure Clustered Multiparty Computation (SCMC) to improve the efficiency of SMC by reducing the number of partic...

2016
Takaaki Mizuki

It is known that secure multiparty computation can be performed using physical cards with identical backs, and numerous cardbased cryptographic protocols have been proposed. Almost all existing protocols require multiple cards that have the same pattern on their face sides; thus, a standard deck of playing cards cannot be used for executing these protocols. However, there is one exception: Niem...

2002
Ashwin Machanavajjhala K. Srinathan C. Pandu Rangan

We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...

Journal: :Journal of Sensor and Actuator Networks 2023

In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible trustworthy for all participants. This particularly challenging in light of the dynamic nature these networks. To overcome limitations, our proposed solution utilizes blo...

2016
Sebastiaan de Hoogh Berry Schoenmakers Meilof Veeningen

For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, even if all parties executing the secure computation collude. Since the inputs to a secure computation are private, and potentially the outputs are private as well, adding verifiability is in general...

Journal: :IACR Cryptology ePrint Archive 2016
Geoffroy Couteau

A secure comparison protocol allows players to evaluate the greater-than predicate on hidden values; it addresses a problem that belongs to the field of multiparty computation, in which players wish to jointly and privately evaluate a function on secret inputs. Introduced by Yao under the name millionaires’ problem, secure comparison has received a great deal of attention. It has proven to be a...

2014
Iddo Bentov Ranjit Kumaresan

We study a model of fairness in secure computation in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty. We then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority). In particular, we propose new ideal functionalities and pr...

Journal: :CoRR 2009
Rashid Sheikh Beerendra Kumar Durgesh Kumar Mishra

Secure Multiparty Computation (SMC) allows parties to know the result of cooperative computation while preserving privacy of individual data. Secure sum computation is an important application of SMC. In our proposed protocols parties are allowed to compute the sum while keeping their individual data secret with increased computation complexity for hacking individual data. In this paper the dat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید