Cryptographically Secure Computation

被引:7
作者
Shen, Emily [1 ]
Varia, Mayank [1 ]
Cunningham, Robert K. [1 ]
Vesey, W. Konrad [2 ]
机构
[1] MIT Lincoln Lab, Secure Resilient Syst & Technol Grp, Lexington, MA 02421 USA
[2] Elkridge Secur, Elkridge, MD USA
关键词
cryptography; IARPA; Intelligence Advanced Research Projects Activity; MIT Lincoln Laboratory; secret sharing; secure multiparty computation; security; Security and Privacy Assurance Research; software engineering; SPAR;
D O I
10.1109/MC.2015.101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers are making secure multiparty computation-a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret-faster and easier to use for application software developers.
引用
收藏
页码:78 / 81
页数:4
相关论文
共 50 条
  • [21] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [22] Secure Multiparty Computation: From Millionaires Problem to Anonymizer
    Sheikh, Rashid
    Mishra, Durgesh Kumar
    Kumar, Beerendra
    INFORMATION SECURITY JOURNAL, 2011, 20 (01): : 25 - 33
  • [23] Secure multiparty computation of solid geometric problems and their applications
    Li, Shundong
    Wu, Chunying
    Wang, Daoshun
    Dai, Yiqi
    INFORMATION SCIENCES, 2014, 282 : 401 - 413
  • [24] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [25] Secure and Scalable Statistical Computation of Questionnaire Data in R
    Yigzaw, Kassaye Yitbarek
    Michalas, Antonis
    Bellika, Johan Gustav
    IEEE ACCESS, 2016, 4 : 4635 - 4645
  • [26] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [27] Secure Multi Party Learning: From Secure Computation to Secure Learning
    Han W.-L.
    Song L.-S.
    Ruan W.-Q.
    Lin G.-P.
    Wang Z.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (07): : 1494 - 1512
  • [28] Multiparty Computation Secure Against Continual Memory Leakage
    Boyle, Elette
    Goldwasser, Shafi
    Jain, Abhishek
    Kalai, Yael Tauman
    STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2012, : 1235 - 1254
  • [29] Secure Distributed Computation of Anonymized Views of Shared Databases
    Tassa, Tamir
    Gudes, Ehud
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2012, 37 (02):
  • [30] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266