Secure Computation of the $$k^{\mathrm {th}}$$-Ranked Element in a Star Network

Author(s):  
Anselme Tueno ◽  
Florian Kerschbaum ◽  
Stefan Katzenbeisser ◽  
Yordan Boev ◽  
Mubashir Qureshi
Author(s):  
Jong-Seok Kim ◽  
◽  
Hyung Jae Chang ◽  
Keyword(s):  

1988 ◽  
Vol 24 (21) ◽  
pp. 1313 ◽  
Author(s):  
Y.C. Chung ◽  
K.J. Pollock ◽  
P.J. Fitzgerald ◽  
B. Glance ◽  
R.W. Tkach ◽  
...  

Author(s):  
Ivan Damgård ◽  
Jesper Buus Nielsen ◽  
Rafail Ostrovsky ◽  
Adi Rosén
Keyword(s):  

2021 ◽  
Author(s):  
Ken Takashima ◽  
Daiki Miyahara ◽  
Takaaki Mizuki ◽  
Hideaki Sone

AbstractIn 1989, den Boer presented the first card-based protocol, called the “five-card trick,” that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enables a couple to confirm their mutual love without revealing their individual feelings. During such a secure computation protocol, it is important to keep any information about the inputs secret. Almost all existing card-based protocols are secure under the assumption that all players participating in a protocol are semi-honest or covert, i.e., they do not deviate from the protocol if there is a chance that they will be caught when cheating. In this paper, we consider a more malicious attack in which a player as an active adversary can reveal cards illegally without any hesitation. Against such an actively revealing card attack, we define the t-secureness, meaning that no information about the inputs leaks even if at most t cards are revealed illegally. We then actually design t-secure AND protocols. Thus, our contribution is the construction of the first formal framework to handle actively revealing card attacks as well as their countermeasures.


Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Jibing Wu ◽  
Lianfei Yu ◽  
Qun Zhang ◽  
Peiteng Shi ◽  
Lihua Liu ◽  
...  

The heterogeneous information networks are omnipresent in real-world applications, which consist of multiple types of objects with various rich semantic meaningful links among them. Community discovery is an effective method to extract the hidden structures in networks. Usually, heterogeneous information networks are time-evolving, whose objects and links are dynamic and varying gradually. In such time-evolving heterogeneous information networks, community discovery is a challenging topic and quite more difficult than that in traditional static homogeneous information networks. In contrast to communities in traditional approaches, which only contain one type of objects and links, communities in heterogeneous information networks contain multiple types of dynamic objects and links. Recently, some studies focus on dynamic heterogeneous information networks and achieve some satisfactory results. However, they assume that heterogeneous information networks usually follow some simple schemas, such as bityped network and star network schema. In this paper, we propose a multityped community discovery method for time-evolving heterogeneous information networks with general network schemas. A tensor decomposition framework, which integrates tensor CP factorization with a temporal evolution regularization term, is designed to model the multityped communities and address their evolution. Experimental results on both synthetic and real-world datasets demonstrate the efficiency of our framework.


1983 ◽  
Vol 62 (3) ◽  
pp. 631-638 ◽  
Author(s):  
A. Albanese

2003 ◽  
Author(s):  
B. Glance ◽  
K.J. Pollock ◽  
P.J. Fitzgerald ◽  
C.A. Burrus ◽  
B.L. Kasper ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document