Cryptographically Secure Computation

被引:7
作者
Shen, Emily [1 ]
Varia, Mayank [1 ]
Cunningham, Robert K. [1 ]
Vesey, W. Konrad [2 ]
机构
[1] MIT Lincoln Lab, Secure Resilient Syst & Technol Grp, Lexington, MA 02421 USA
[2] Elkridge Secur, Elkridge, MD USA
关键词
cryptography; IARPA; Intelligence Advanced Research Projects Activity; MIT Lincoln Laboratory; secret sharing; secure multiparty computation; security; Security and Privacy Assurance Research; software engineering; SPAR;
D O I
10.1109/MC.2015.101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Researchers are making secure multiparty computation-a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs secret-faster and easier to use for application software developers.
引用
收藏
页码:78 / 81
页数:4
相关论文
共 50 条
  • [41] Secure Key Management for Multi-Party Computation in MOZAIK
    Marque, Enzo
    Moeyersons, Jerico
    Pohle, Erik
    Van Kenhove, Michiel
    Abidin, Aysajan
    Volckaert, Bruno
    [J]. 2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 133 - 140
  • [42] Secure multi-party computation protocol for sequencing problem
    TANG ChunMing 1
    2State Key Laboratory of Information Security
    3 School of Mathematics and Computational Science
    [J]. Science China(Information Sciences), 2011, 54 (08) : 1654 - 1662
  • [43] Secure Computation of Two Set-Relationships with the Unencrypted Method
    Chen Z.-H.
    Li S.-D.
    Huang Q.
    Ding Y.
    Liu Y.-R.
    [J]. Chen, Zhen-Hua (chenzhenhua@snnu.edu.cn), 2018, Chinese Academy of Sciences (29): : 473 - 482
  • [44] When Is a Semi-honest Secure Multiparty Computation Valuable?
    Bhargava, Radhika
    Clifton, Chris
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 45 - 64
  • [45] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [46] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [47] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [48] Secure Data Sharing With Lightweight Computation in E-Health
    Zhang, Leyou
    Gao, Xuehuang
    Mu, Yi
    [J]. IEEE ACCESS, 2020, 8 : 209630 - 209643
  • [49] Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    [J]. IEEE ACCESS, 2025, 13 : 9015 - 9031
  • [50] Efficient and Cryptographically Secure Pseudorandom Number Generators based on Chains of Hybrid Cellular Automata Maps
    Radu, Dogaru
    Ioana, Dogaru
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,