Secure multi-party computation problems and their applications: a review and open problems
W Du, MJ Atallah - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …
computation, where people are jointly conducting computation tasks based on the private …
Public-key cryptography
A Salomaa - 2013 - books.google.com
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal
discovery in 1977 of public-key cryptography and applications in computers and …
discovery in 1977 of public-key cryptography and applications in computers and …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
Cryptflow2: Practical 2-party secure inference
We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep
Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both …
Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both …
Minimum disclosure proofs of knowledge
Protocols are given for allowing a “prover” to convince a “verifier” that the prover knows
some verifiable secret information, without allowing the verifier to learn anything about the …
some verifiable secret information, without allowing the verifier to learn anything about the …
Extending oblivious transfers efficiently
We consider the problem of extending oblivious transfers: Given a small number of oblivious
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …
Oblivious transfer and polynomial evaluation
We describe efficient constructions for two oblivious twoparty computation problems: l-out-of-
N Oblivious Transfer &d 'Oblivious Poly&nial Evaluation. The oblivious polynomial …
N Oblivious Transfer &d 'Oblivious Poly&nial Evaluation. The oblivious polynomial …
[BOOK][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …
topics, techniques, and applications. Along with updating and revising many of the existing …
Priced oblivious transfer: How to sell digital goods
We consider the question of protecting the privacy of customers buying digital goods. More
specifically, our goal is to allow a buyer to purchase digital goods from a vendor without …
specifically, our goal is to allow a buyer to purchase digital goods from a vendor without …
XPIR: Private information retrieval for everyone
CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …
from a database while hiding which from the database administrators. PIR can be achieved …