Survey on blockchain for Internet of Things
Abstract The Internet of Things (IoT) is poised to transform human life and unleash
enormous economic benefit. However, inadequate data security and trust of current IoT are …
enormous economic benefit. However, inadequate data security and trust of current IoT are …
[BOOK][B] Secure multiparty computation
R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …
private information is an important resource. How can parties handle confidential data if they …
General secure multi-party computation from any linear secret-sharing scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC)
among a set of n players can efficiently be based on any linear secret sharing scheme …
among a set of n players can efficiently be based on any linear secret sharing scheme …
Player simulation and general adversary structures in perfect multiparty computation
M Hirt, U Maurer - Journal of cryptology, 2000 - Springer
The goal of secure multiparty computation is to transform a given protocol involving a trusted
party into a protocol without need for the trusted party, by simulating the party among the …
party into a protocol without need for the trusted party, by simulating the party among the …
[HTML][HTML] Secure multi-party computation made simple
U Maurer - Discrete Applied Mathematics, 2006 - Elsevier
Known secure multi-party computation protocols are quite complex, involving non-trivial
mathematical structures and sub-protocols. The purpose of this paper is to present a very …
mathematical structures and sub-protocols. The purpose of this paper is to present a very …
Multiparty computation, an introduction
D Catalano, R Cramer, G Di Crescenzo… - Contemporary …, 2005 - Springer
These lecture notes introduce the notion of secure multiparty computation. We introduce
some concepts necessary to define what it means for a multiparty protocol to be secure, and …
some concepts necessary to define what it means for a multiparty protocol to be secure, and …
Efficient multi-party computation over rings
Secure multi-party computation (MPC) is an active research area, and a wide range of
literature can be found nowadays suggesting improvements and generalizations of existing …
literature can be found nowadays suggesting improvements and generalizations of existing …
[PDF][PDF] Multi party computation: Efficient protocols, general adversaries, and voting
M Hirt - 2001 - crypto.ethz.ch
Secure multi-party computation allows a set of players to jointly compute an arbitrary
function of their inputs, without revealing these inputs to each other. For example, the …
function of their inputs, without revealing these inputs to each other. For example, the …
Robust information-theoretic private information retrieval
A Beimel, Y Stahl - … Networks: Third International Conference, SCN 2002 …, 2003 - Springer
Abstract A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of
its choice from a database, such that the servers storing the database do not gain …
its choice from a database, such that the servers storing the database do not gain …
Network agnostic MPC with statistical security
A Appan, A Choudhury - Theory of Cryptography Conference, 2023 - Springer
In this work, we initiate the study of network agnostic MPC protocols with statistical security.
Network agnostic MPC protocols give the best possible security guarantees, irrespective of …
Network agnostic MPC protocols give the best possible security guarantees, irrespective of …