Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities

JI Choi, KRB Butler - Security and Communication Networks, 2019 - Wiley Online Library
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …

An end-to-end system for large scale P2P MPC-as-a-service and low-bandwidth MPC for weak participants

A Barak, M Hirt, L Koskas, Y Lindell - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Protocols for secure multiparty computation enable a set of parties to compute a joint
function of their inputs, while preserving privacy, correctness and more. In theory, secure …

Ethereum-based emergency service for smart home system: Smart contract implementation

YN Aung, T Tantidham - 2019 21st International Conference on …, 2019 - ieeexplore.ieee.org
Emergency service call for public service providers has become an important role for smart
home applications in order to support safety and security in the household building …

Clouded data: Privacy and the promise of encryption

L Munn, T Hristova, L Magee - Big Data & Society, 2019 - journals.sagepub.com
Personal data is highly vulnerable to security exploits, spurring moves to lock it down
through encryption, to cryptographically 'cloud'it. But personal data is also highly valuable to …

Programming support for an integrated multi-party computation and MapReduce infrastructure

N Volgushev, A Lapets… - 2015 Third IEEE …, 2015 - ieeexplore.ieee.org
We describe and present a prototype of a distributed computational infrastructure and
associated high-level programming language that allow multiple parties to leverage their …

[PDF][PDF] Confidential Computing via Multiparty Computation and Trusted Computing

J Dispan - 2023 - jdispan.de
In the wake of the social sciences' so-called replication crisis, researches increasingly strive
to adopt methods preventing questionable research practices in empirical studies, eg, study …

[PDF][PDF] Scather: programming with multi-party computation and MapReduce

N Volgushev, A Lapets, A Bestavros - 2015 - lapets.io
We present a prototype of a distributed computational infrastructure, an associated highlevel
programming language, and an underlying formal framework that allow multiple parties to …

The New Privacy: Emerging Standards for Cloud-Based Security

L Munn, T Hristova, L Magee, D Bourdignon… - 2019 - researchdirect.westernsydney.edu …
From consumer hard drives and enterprise servers, data is migrating to the cloud. Driven by
lower costs of ownership, elastic on-demand services, improved interoperability and the …