Secure Multiparty Multisets Computation

被引:0
|
作者
Pan, Jiahao [1 ]
Dou, Jiawei [1 ]
机构
[1] School of Mathematics and Statistics, Shaanxi Normal University, Xi’an,710119, China
关键词
Compendex;
D O I
10.6633/IJNS.202305_25(3).05
中图分类号
学科分类号
摘要
Cryptography
引用
收藏
页码:425 / 430
相关论文
共 50 条
  • [31] Secure multiparty quantum computation with few qubits
    Lipinska, Victoria
    Ribeiro, Jeremy
    Wehner, Stephanie
    PHYSICAL REVIEW A, 2020, 102 (02)
  • [32] Oblivious array access for secure multiparty computation
    Laud, Peeter
    Cryptology and Information Security Series, 2015, 13 : 106 - 128
  • [33] The Broadcast Message Complexity of Secure Multiparty Computation
    Garg, Sanjam
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 426 - 455
  • [34] Multiparty Computation: To Secure Privacy, Do the Math
    Queue, 2023, 21 (06): : 78 - 100
  • [35] Global-Scale Secure Multiparty Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 39 - 56
  • [36] Asynchronous Secure Multiparty Computation in Constant Time
    Cohen, Ran
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 183 - 207
  • [37] Key technologies and applications of secure multiparty computation
    Guo, X. (guoxiaoqiang@heuu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [38] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [39] Secure Multiparty Quantum Computation for Summation and Multiplication
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    Scientific Reports, 6
  • [40] On Adaptively Secure Multiparty Computation with a Short CRS
    Cohen, Ran
    Peikert, Chris
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 129 - 146