Survey on blockchain for Internet of Things

X Wang, X Zha, W Ni, RP Liu, YJ Guo, X Niu… - Computer …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is poised to transform human life and unleash
enormous economic benefit. However, inadequate data security and trust of current IoT are …

[BOOK][B] Secure multiparty computation

R Cramer, IB Damgård - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …

General secure multi-party computation from any linear secret-sharing scheme

R Cramer, I Damgård, U Maurer - … on the Theory and Applications of …, 2000 - Springer
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC)
among a set of n players can efficiently be based on any linear secret sharing scheme …

Player simulation and general adversary structures in perfect multiparty computation

M Hirt, U Maurer - Journal of cryptology, 2000 - Springer
The goal of secure multiparty computation is to transform a given protocol involving a trusted
party into a protocol without need for the trusted party, by simulating the party among the …

[HTML][HTML] Secure multi-party computation made simple

U Maurer - Discrete Applied Mathematics, 2006 - Elsevier
Known secure multi-party computation protocols are quite complex, involving non-trivial
mathematical structures and sub-protocols. The purpose of this paper is to present a very …

Multiparty computation, an introduction

D Catalano, R Cramer, G Di Crescenzo… - Contemporary …, 2005 - Springer
These lecture notes introduce the notion of secure multiparty computation. We introduce
some concepts necessary to define what it means for a multiparty protocol to be secure, and …

Efficient multi-party computation over rings

R Cramer, S Fehr, Y Ishai, E Kushilevitz - … Warsaw, Poland, May 4–8, 2003 …, 2003 - Springer
Secure multi-party computation (MPC) is an active research area, and a wide range of
literature can be found nowadays suggesting improvements and generalizations of existing …

[PDF][PDF] Multi party computation: Efficient protocols, general adversaries, and voting

M Hirt - 2001 - crypto.ethz.ch
Secure multi-party computation allows a set of players to jointly compute an arbitrary
function of their inputs, without revealing these inputs to each other. For example, the …

Robust information-theoretic private information retrieval

A Beimel, Y Stahl - … Networks: Third International Conference, SCN 2002 …, 2003 - Springer
Abstract A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of
its choice from a database, such that the servers storing the database do not gain …

Network agnostic MPC with statistical security

A Appan, A Choudhury - Theory of Cryptography Conference, 2023 - Springer
In this work, we initiate the study of network agnostic MPC protocols with statistical security.
Network agnostic MPC protocols give the best possible security guarantees, irrespective of …