نتایج جستجو برای: secure multiparty computation
تعداد نتایج: 197740 فیلتر نتایج به سال:
We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expected 70 + 20 255 rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive secu...
Secure Multiparty Computation (SMC) is well-known to have serious scalability issues. In fact, in spite of many significant achievements reported in SMC literature, SMC protocols are seldom efficiently scalable to real-world applications. In this paper we propose a new scheme, called Secure Clustered Multiparty Computation (SCMC) to improve the efficiency of SMC by reducing the number of partic...
It is known that secure multiparty computation can be performed using physical cards with identical backs, and numerous cardbased cryptographic protocols have been proposed. Almost all existing protocols require multiple cards that have the same pattern on their face sides; thus, a standard deck of playing cards cannot be used for executing these protocols. However, there is one exception: Niem...
We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...
In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible trustworthy for all participants. This particularly challenging in light of the dynamic nature these networks. To overcome limitations, our proposed solution utilizes blo...
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, even if all parties executing the secure computation collude. Since the inputs to a secure computation are private, and potentially the outputs are private as well, adding verifiability is in general...
A secure comparison protocol allows players to evaluate the greater-than predicate on hidden values; it addresses a problem that belongs to the field of multiparty computation, in which players wish to jointly and privately evaluate a function on secret inputs. Introduced by Yao under the name millionaires’ problem, secure comparison has received a great deal of attention. It has proven to be a...
We study a model of fairness in secure computation in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty. We then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority). In particular, we propose new ideal functionalities and pr...
Secure Multiparty Computation (SMC) allows parties to know the result of cooperative computation while preserving privacy of individual data. Secure sum computation is an important application of SMC. In our proposed protocols parties are allowed to compute the sum while keeping their individual data secret with increased computation complexity for hacking individual data. In this paper the dat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید