Secure Multiparty Computation between Distrusted Networks Terminals Public Deposited

http://ir.library.oregonstate.edu/concern/defaults/qr46r2095

This is the publisher’s final pdf. The published article is copyrighted by the author(s) and published by Springer. The published article can be found at:  http://jis.eurasipjournals.com/.

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secure multiparty computation (SMC) is the study of such distributed computation protocols that allow distrusted parties to perform joint computation without disclosing private data. SMC is increasingly used in diverse fields from data mining to computer vision. This paper provides a tutorial on SMC for nonexperts in cryptography and surveys some of the latest advances in this exciting area including various schemes for reducing communication and computation complexity of SMC protocols, doubly homomorphic encryption and private information retrieval.
Resource Type
DOI
Date Available
Date Issued
Citation
  • S-CS, C., & Thinh, N. (2007). Secure multiparty computation between distrusted networks terminals. EURASIP Journal on Information Security, 2007: 51368. doi:10.1155/2007/51368
Series
Rights Statement
Publisher
Peer Reviewed
Language
Replaces
Additional Information
  • description.provenance : Made available in DSpace on 2014-08-07T15:20:26Z (GMT). No. of bitstreams: 2 license_rdf: 1370 bytes, checksum: cd1af5ab51bcc7a5280cf305303530e9 (MD5) NguyenThinhEECSSecureMultipartyComputation.pdf: 865186 bytes, checksum: c045eb5c952d136aa4b0400b3b77f08c (MD5) Previous issue date: 2007-12-11
  • description.provenance : Submitted by Erin Clark (erin.clark@oregonstate.edu) on 2014-08-07T15:20:15Z No. of bitstreams: 2 license_rdf: 1370 bytes, checksum: cd1af5ab51bcc7a5280cf305303530e9 (MD5) NguyenThinhEECSSecureMultipartyComputation.pdf: 865186 bytes, checksum: c045eb5c952d136aa4b0400b3b77f08c (MD5)
  • description.provenance : Approved for entry into archive by Erin Clark(erin.clark@oregonstate.edu) on 2014-08-07T15:20:26Z (GMT) No. of bitstreams: 2 license_rdf: 1370 bytes, checksum: cd1af5ab51bcc7a5280cf305303530e9 (MD5) NguyenThinhEECSSecureMultipartyComputation.pdf: 865186 bytes, checksum: c045eb5c952d136aa4b0400b3b77f08c (MD5)

Relationships

In Administrative Set:
Last modified: 07/18/2017

Downloadable Content

Download PDF
Citations:

EndNote | Zotero | Mendeley

Items