Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Unlynx: a decentralized system for privacy-conscious data sharing
D Froelicher, P Egger, JS Sousa… - Proceedings on …, 2017 - infoscience.epfl.ch
Current solutions for privacy-preserving data sharing among multiple parties either depend
on a centralized authority that must be trusted and provides only weakest-link security (eg …
on a centralized authority that must be trusted and provides only weakest-link security (eg …
Large-scale secure computation: Multi-party computation for (parallel) RAM programs
We present the first efficient (ie, polylogarithmic overhead) method for securely and privately
processing large data sets over multiple parties with parallel, distributed algorithms. More …
processing large data sets over multiple parties with parallel, distributed algorithms. More …
Breaking the O (√ n)-bit barrier: Byzantine agreement with polylog bits per party
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face
of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed …
of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed …
The more the merrier: Reducing the cost of large scale MPC
Secure multi-party computation (MPC) allows multiple parties to perform secure joint
computations on their private inputs. Today, applications for MPC are growing with …
computations on their private inputs. Today, applications for MPC are growing with …
Stormy: Statistics in tor by measuring securely
Tor is a tool for Internet privacy with millions of daily users. The Tor system benefits in many
ways from information gathered about the operation of its network. Measurements guide …
ways from information gathered about the operation of its network. Measurements guide …
Recent results in scalable multi-party computation
Secure multi-party computation (MPC) allows multiple parties to compute a known function
over inputs held by each party, without any party having to reveal its private input …
over inputs held by each party, without any party having to reveal its private input …
Optimally efficient multi-party fair exchange and fair secure multi-party computation
H Kılınç, A Küpçü - Cryptographers' Track at the RSA Conference, 2015 - Springer
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are
under-studied fields of research, with practical importance. We examine MFE scenarios …
under-studied fields of research, with practical importance. We examine MFE scenarios …
The bottleneck complexity of secure multiparty computation
In this work, we initiate the study of bottleneck complexity as a new communication efficiency
measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an …
measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an …
Optimally efficient multi-party fair exchange and fair secure multi-party computation
HK Alper, A Küpçü - ACM Transactions on Privacy and Security, 2021 - dl.acm.org
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are
under-studied fields of research, with practical importance. In particular, we consider MFE …
under-studied fields of research, with practical importance. In particular, we consider MFE …
Secure multi-party shuffling
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a
random permutation of their inputs while kee** the permutation secret. This problem is …
random permutation of their inputs while kee** the permutation secret. This problem is …