Alice has a private input x (of any data type, such as a number, a matrix or a data set). Bob has another private input y. Alice and Bob want to cooperatively conduct a specific computation on x and y without disclosing to the other person any information about her or his private input except for what could be derived from the results. This problem is a Secure Two-party Computation (STC) problem, which has been extensively studied in the past. Several generic solutions have been proposed to solve the general STC problem; however the generic solutions are often too inefficient to be practical. Therefore, in this dissertation, we study several specific STC problems with the goal of finding more efficient solutions than the generic ones. We in...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Secure computation is the computation of a function over private inputs. In the general setting, par...
In a data-driven society, individuals and companies encounter numerous situations where private info...
Abstract. The general secure multi-party computation problem is when multiple parties (say, Alice an...
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parti...
In recent years there has been massive progress in the development of technologies for storing and p...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
The growth of the Internet opens up tremendous oppor-tunities for cooperative computation, where the...
Secure multi-party computation (MPC) is a central area of research in cryptography. Its goal is to a...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...
The growth of the Internet has triggered tremendous opportunities for cooperative computation, where...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
Secure computation is the computation of a function over private inputs. In the general setting, par...
In a data-driven society, individuals and companies encounter numerous situations where private info...
Abstract. The general secure multi-party computation problem is when multiple parties (say, Alice an...
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parti...
In recent years there has been massive progress in the development of technologies for storing and p...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
The growth of the Internet opens up tremendous oppor-tunities for cooperative computation, where the...
Secure multi-party computation (MPC) is a central area of research in cryptography. Its goal is to a...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their ...
cryptography, privacy, data mining Research in secure distributed computation, which was done as par...
We introduce an extension of covert two-party computation (as introducted by von Ahn, Hopper, Langfo...