Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SecureNN: 3-party secure computation for neural network training
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …
inference. To effectively train, it is desirable for multiple parties to combine their data …
[BOK][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
Security and composition of multiparty cryptographic protocols
R Canetti - Journal of CRYPTOLOGY, 2000 - Springer
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
O Goldreich, S Micali, A Wigderson - Journal of the ACM (JACM), 1991 - dl.acm.org
In this paper the generality and wide applicability of Zero-knowledge proofs, a notion
introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and …
introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and …
[PDF][PDF] Secure multi-party computation
O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
Sharemind: A framework for fast privacy-preserving computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe
for building the necessary information systems. In this paper, we present a provably secure …
for building the necessary information systems. In this paper, we present a provably secure …
[PDF][PDF] Adaptively secure multi-party computation
A fundamental problem in designing secure multi-party protocols is how to deal with
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …
[PDF][PDF] Protecting data privacy in private information retrieval schemes
Protecting Data Privacy in Private Information Retrieval Schemes Page 1 Protecting Data
Privacy in Private Information Retrieval Schemes Yael Gertner* Yuval Ishai t Eyal Kushilevitd …
Privacy in Private Information Retrieval Schemes Yael Gertner* Yuval Ishai t Eyal Kushilevitd …
Perfectly secure message transmission
This paper studies the problem of perfectly secure communication in general network in
which processors and communication lines may be faulty. Lower bounds are obtained on …
which processors and communication lines may be faulty. Lower bounds are obtained on …
Securenn: Efficient and private neural network training
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …
inference. To effectively train, it is desirable for multiple parties to combine their data …