Linear algebra operations on private distributed data are frequently required in several practical scenarios (e.g., statistical analysis and privacy preserving databases). We present universally composable two-party protocols to compute inner products, determinants, eigenvalues, and eigenvectors. These protocols are built for a two-party scenario where the inputs are provided by mutually distrustful parties. After execution, the protocols yield the results of the intended operation while preserving the privacy of their inputs. Universal composability is obtained in the trusted initializer model, ensuring information theoretical security under arbitrary protocol composition in complex environments. Furthermore, our protocols are computationa...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
In many important applications, a collection of mutually distrustful parties must perform private co...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
International audienceWe propose an interactive algorithmic scheme for outsourcing matrix computatio...
Abstract. Linear algebra plays an important role in computer science, especially in cryptography.Num...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Imagine two companies who each manage part of a delivery network. Suppose these companies are consid...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
In many important applications, a collection of mutually distrustful parties must perform private co...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...
Exact linear algebra is an essential tool for scientific computation, which is used ina wide array o...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
International audienceWe propose an interactive algorithmic scheme for outsourcing matrix computatio...
Abstract. Linear algebra plays an important role in computer science, especially in cryptography.Num...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
Secure multi-party computation systems are commonly built from a small set of primitive components. ...
Solving linear programming (LP) problems can be used to solve many different types of problems. Imme...
In this paper we are interested in efficient and secure constant round multi-party protocols which p...
Imagine two companies who each manage part of a delivery network. Suppose these companies are consid...
This paper proposes new Polynomial IOPs for arithmetic circuits. They rely on the monomial coefficie...
International audienceThis paper deals with distributed matrix multiplication. Each player owns only...
In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due ...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
In many important applications, a collection of mutually distrustful parties must perform private co...
We present two unconditional secure protocols for private set disjointness tests. In order to provid...