In this PhD dissertation, we investigate how to solve some classical combinatorial optimization problems in network flows and their applications, using secure multiparty computation. Our study highlights the differences between traditional and secure adaptations of some algorithms to later test its implementation. It also explores various trade-offs between performance and security. We provide protocols that can be used as building blocks to solve more complex problems. Additionally, we report on practical applications, more specifically, we study the problem of securely building auction mechanisms with transmission constraints. We focus on improving performance for real life applications. We report on the design of a specific Object Orient...
We study the problem of securely building single-commodity multi-markets auction mechanisms. We intr...
The Internet is by definition a network of networks. No-one operates, or controls more than a small ...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
We investigate how to solve several classical network flow problems using secure multi-party computa...
We investigate how to solve several classical network flow problems using secure multi-party computa...
With the advent of the information age, the network security is particularly important. The secure m...
We investigate the problem of solving traditional combinatorial graph problems using secure multi-pa...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We introduce a robust framework that allows for cryptographically secure multiparty computations, su...
Despite evidence that collaborating in the supply chain can reduce inefficiency and result in mutual...
This is the publisher’s final pdf. The published article is copyrighted by the author(s) and publish...
Abstract. We investigate the problem of solving traditional combina-torial graph problems using secu...
We study the problem of securely building single-commodity multi-markets auction mechanisms. We intr...
The Internet is by definition a network of networks. No-one operates, or controls more than a small ...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
We investigate how to solve several classical network flow problems using secure multi-party computa...
We investigate how to solve several classical network flow problems using secure multi-party computa...
With the advent of the information age, the network security is particularly important. The secure m...
We investigate the problem of solving traditional combinatorial graph problems using secure multi-pa...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We introduce a robust framework that allows for cryptographically secure multiparty computations, su...
Despite evidence that collaborating in the supply chain can reduce inefficiency and result in mutual...
This is the publisher’s final pdf. The published article is copyrighted by the author(s) and publish...
Abstract. We investigate the problem of solving traditional combina-torial graph problems using secu...
We study the problem of securely building single-commodity multi-markets auction mechanisms. We intr...
The Internet is by definition a network of networks. No-one operates, or controls more than a small ...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...