Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir\u27s secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participants, making it prone to collusion attacks. In this dissertation, I propose an agent-based computing framework using SSS to protect privacy in distri...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
The data, which contain the personal, medical and financial information of the data donors, are clas...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Abstract—Outsourced computing gives computationally-limited data owners opportunities to have third ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parti...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
In practice, there are numerous settings where mutually distrusting parties need to perform distribu...
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
The data, which contain the personal, medical and financial information of the data donors, are clas...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Abstract—Outsourced computing gives computationally-limited data owners opportunities to have third ...
Multiparty computation protocols (MPC) are said to be secure against covert adversaries if the hones...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parti...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
In practice, there are numerous settings where mutually distrusting parties need to perform distribu...
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
Use of technology for data collection and analysis has seen an unprecedented growth in the last coup...
The data, which contain the personal, medical and financial information of the data donors, are clas...