Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
An end-to-end system for large scale P2P MPC-as-a-service and low-bandwidth MPC for weak participants
A Barak, M Hirt, L Koskas, Y Lindell - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Protocols for secure multiparty computation enable a set of parties to compute a joint
function of their inputs, while preserving privacy, correctness and more. In theory, secure …
function of their inputs, while preserving privacy, correctness and more. In theory, secure …
Ethereum-based emergency service for smart home system: Smart contract implementation
YN Aung, T Tantidham - 2019 21st International Conference on …, 2019 - ieeexplore.ieee.org
Emergency service call for public service providers has become an important role for smart
home applications in order to support safety and security in the household building …
home applications in order to support safety and security in the household building …
Clouded data: Privacy and the promise of encryption
Personal data is highly vulnerable to security exploits, spurring moves to lock it down
through encryption, to cryptographically 'cloud'it. But personal data is also highly valuable to …
through encryption, to cryptographically 'cloud'it. But personal data is also highly valuable to …
Programming support for an integrated multi-party computation and MapReduce infrastructure
N Volgushev, A Lapets… - 2015 Third IEEE …, 2015 - ieeexplore.ieee.org
We describe and present a prototype of a distributed computational infrastructure and
associated high-level programming language that allow multiple parties to leverage their …
associated high-level programming language that allow multiple parties to leverage their …
[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing
J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …
to adopt methods preventing questionable research practices in empirical studies, eg, study …
[PDF][PDF] Scather: programming with multi-party computation and MapReduce
We present a prototype of a distributed computational infrastructure, an associated highlevel
programming language, and an underlying formal framework that allow multiple parties to …
programming language, and an underlying formal framework that allow multiple parties to …
The New Privacy: Emerging Standards for Cloud-Based Security
From consumer hard drives and enterprise servers, data is migrating to the cloud. Driven by
lower costs of ownership, elastic on-demand services, improved interoperability and the …
lower costs of ownership, elastic on-demand services, improved interoperability and the …