secure function evaluation
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 2)

H-INDEX

11
(FIVE YEARS 0)

Author(s):  
Rashid Sheikh ◽  
◽  
Rashid Sheikh ◽  
Durgesh Kumar Mishra ◽  
Meghna Dubey ◽  
...  

The ideal Secure Multiparty Computation (SMC) model deploys a Trusted Third Party (TTP) which assists in secure function evaluation. The participating joint parties give input to the TTP which provide the results to the participating parties. The equality check problem in multiple party cases can be solved by simple architecture and a simple algorithm. In our proposed protocol Equality Hash Checkin ideal model, we use a secure hash function. All the parties interested to check equality of their data supply hash of their data to the TTP which then compared all hash values for equality. It declares the result to the parties.



2021 ◽  
pp. 0-0
Author(s):  
Siam U. Hussain ◽  
M. Sadegh Riazi ◽  
Farinaz Koushanfar


Author(s):  
Joseph I. Choi ◽  
Dave (Jing) Tian ◽  
Grant Hernandez ◽  
Christopher Patton ◽  
Benjamin Mood ◽  
...  


Author(s):  
José Bacelar Almeida ◽  
Manuel Barbosa ◽  
Gilles Barthe ◽  
François Dupressoir ◽  
Benjamin Grégoire ◽  
...  


2016 ◽  
Vol 653 ◽  
pp. 53-78
Author(s):  
Özgür Dagdelen ◽  
Payman Mohassel ◽  
Daniele Venturi


Author(s):  
Debayan Gupta ◽  
Benjamin Mood ◽  
Joan Feigenbaum ◽  
Kevin Butler ◽  
Patrick Traynor


2015 ◽  
Vol 13 (04) ◽  
pp. 1550028 ◽  
Author(s):  
Sean Hallgren ◽  
Adam Smith ◽  
Fang Song

Cryptographic protocols, such as protocols for secure function evaluation (SFE), have played a crucial role in the development of modern cryptography. The extensive theory of these protocols, however, deals almost exclusively with classical attackers. If we accept that quantum information processing is the most realistic model of physically feasible computation, then we must ask: What classical protocols remain secure against quantum attackers? Our main contribution is showing the existence of classical two-party protocols for the secure evaluation of any polynomial-time function under reasonable computational assumptions (for example, it suffices that the learning with errors problem be hard for quantum polynomial time). Our result shows that the basic two-party feasibility picture from classical cryptography remains unchanged in a quantum world.



Sign in / Sign up

Export Citation Format

Share Document