Cryptographically Secure Computation

被引:7
作者
Shen, Emily [1 ]
Varia, Mayank [1 ]
Cunningham, Robert K. [1 ]
Vesey, W. Konrad [2 ]
机构
[1] MIT Lincoln Lab, Secure Resilient Syst & Technol Grp, Lexington, MA 02421 USA
[2] Elkridge Secur, Elkridge, MD USA
关键词
cryptography; IARPA; Intelligence Advanced Research Projects Activity; MIT Lincoln Laboratory; secret sharing; secure multiparty computation; security; Security and Privacy Assurance Research; software engineering; SPAR;
D O I
10.1109/MC.2015.101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers are making secure multiparty computation-a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret-faster and easier to use for application software developers.
引用
收藏
页码:78 / 81
页数:4
相关论文
共 50 条
  • [31] Multiparty Computation Secure Against Continual Memory Leakage
    Boyle, Elette
    Goldwasser, Shafi
    Jain, Abhishek
    Kalai, Yael Tauman
    STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2012, : 1235 - 1254
  • [32] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [33] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    JOURNAL OF THE ACM, 2011, 58 (06)
  • [34] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [35] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [36] Secure computation without computers
    D'Arco, Paolo
    De Prisco, Roberto
    THEORETICAL COMPUTER SCIENCE, 2016, 651 : 11 - 36
  • [37] Secure Distributed Computation in the Exponent
    Wang, Hong
    Wei, Shimin
    HIGH PERFORMANCE STRUCTURES AND MATERIALS ENGINEERING, PTS 1 AND 2, 2011, 217-218 : 994 - 1000
  • [38] Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation
    von der Heyden, Jonas
    Schlueter, Nils
    Binfet, Philipp
    Asman, Martin
    Zdrallek, Markus
    Jager, Tibor
    Darup, Moritz Schulze
    IEEE TRANSACTIONS ON SMART GRID, 2025, 16 (01) : 344 - 355
  • [39] Cryptographically secure hardware random number generator dedicated for distributed measurement and control systems
    Czernik, Pawel
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2012, 2012, 8454
  • [40] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    IEEE ACCESS, 2024, 12 : 53881 - 53899