Computational complexity: a conceptual perspective
O Goldreich - ACM Sigact News, 2008 - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …
content, and that this contents should be explicitly communicated in expositions and courses …
[HTML][HTML] On the privacy-conscientious use of mobile phone data
The breadcrumbs we leave behind when using our mobile phones—who somebody calls,
for how long, and from where—contain unprecedented insights about us and our societies …
for how long, and from where—contain unprecedented insights about us and our societies …
MP-SPDZ: A versatile framework for multi-party computation
M Keller - Proceedings of the 2020 ACM SIGSAC conference on …, 2020 - dl.acm.org
Multi-Protocol SPDZ (MP-SPDZ) is a fork of SPDZ-2 (Keller et al., CCS'13), an
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
implementation of the multi-party computation (MPC) protocol called SPDZ (Damgård et al …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control
X Yue, H Wang, D Jin, M Li, W Jiang - Journal of medical systems, 2016 - Springer
Healthcare data are a valuable source of healthcare intelligence. Sharing of healthcare data
is one essential step to make healthcare system smarter and improve the quality of …
is one essential step to make healthcare system smarter and improve the quality of …
Secure multiparty computation
Y Lindell - Communications of the ACM, 2020 - dl.acm.org
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
SecureNN: 3-party secure computation for neural network training
Neural Networks (NN) provide a powerful method for machine learning training and
inference. To effectively train, it is desirable for multiple parties to combine their data …
inference. To effectively train, it is desirable for multiple parties to combine their data …
High-throughput semi-honest secure three-party computation with an honest majority
In this paper, we describe a new information-theoretic protocol (and a computationally-
secure variant) for secure three-party computation with an honest majority. The protocol has …
secure variant) for secure three-party computation with an honest majority. The protocol has …
Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …
powerful but untrusted" cloud" server. In this notion that we call on-the-fly multiparty …