Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022‏ - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Secure multiparty computation

Y Lindell - Communications of the ACM, 2020‏ - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …

Data ownership: a survey

J Asswad, J Marx Gómez - Information, 2021‏ - mdpi.com
The importance of data is increasing along its inflation in our world today. In the big data era,
data is becoming a main source for innovation, knowledge and insight, as well as a …

[کتاب][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001‏ - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001‏ - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

[کتاب][B] Secure multiparty computation and secret sharing

R Cramer, IB Damgård, JB Nielsen - 2015‏ - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …

Analysis of key-exchange protocols and their use for building secure channels

R Canetti, H Krawczyk - International conference on the theory and …, 2001‏ - Springer
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …

Security and composition of multiparty cryptographic protocols

R Canetti - Journal of CRYPTOLOGY, 2000‏ - Springer
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …

[PDF][PDF] Secure multi-party computation

O Goldreich - Manuscript. Preliminary version, 1998‏ - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …

Secure multiparty computation for privacy preserving data mining

Y Lindell - Encyclopedia of data warehousing and mining, 2005‏ - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …