Journal articles on the topic 'Garbled Circuit Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 journal articles for your research on the topic 'Garbled Circuit Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ding, Hangchao, Han Jiang, and Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE." Security and Communication Networks 2021 (September 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Full textYang, Yaxi, Xiaojian Liang, Xiangfu Song, et al. "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 680–96. https://doi.org/10.56553/popets-2025-0082.
Full textFang, Xin, Stratis Ioannidis, and Miriam Leeser. "SIFO: Secure Computational Infrastructure Using FPGA Overlays." International Journal of Reconfigurable Computing 2019 (December 6, 2019): 1–18. http://dx.doi.org/10.1155/2019/1439763.
Full textSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8856379.
Full textSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (June 7, 2020): 8856379. https://doi.org/10.1155/2020/8856379.
Full textXin Liu, Xin Liu, Xiaomeng Liu Xin Liu, Dan Luo Xiaomeng Liu, Gang Xu Dan Luo, and Xiu-Bo Chen Gang Xu. "Confidentially Compare Rational Numbers under the Malicious Model." 網際網路技術學刊 25, no. 3 (2024): 355–63. http://dx.doi.org/10.53106/160792642024052503002.
Full textMohassel, Payman, Mike Rosulek, and Ni Trieu. "Practical Privacy-Preserving K-means Clustering." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 414–33. http://dx.doi.org/10.2478/popets-2020-0080.
Full textLi, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.
Full textTueno, Anselme, Florian Kerschbaum, and Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Full textKiss, Ágnes, Jian Liu, Thomas Schneider, N. Asokan, and Benny Pinkas. "Private Set Intersection for Unequal Set Sizes with Mobile Applications." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 177–97. http://dx.doi.org/10.1515/popets-2017-0044.
Full textRiazi, M. Sadegh, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. "Toward Practical Secure Stable Matching." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 62–78. http://dx.doi.org/10.1515/popets-2017-0005.
Full textKim, Yong-Ki, Hyeong-Jin Kim, Hyunjo Lee, and Jae-Woo Chang. "Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing." PLOS ONE 17, no. 5 (2022): e0267908. http://dx.doi.org/10.1371/journal.pone.0267908.
Full textHuang, Junxin, Yuchuan Luo, Ming Xu, Bowen Hu, and Jian Long. "pShare: Privacy-Preserving Ride-Sharing System with Minimum-Detouring Route." Applied Sciences 12, no. 2 (2022): 842. http://dx.doi.org/10.3390/app12020842.
Full textZhang, Liang Feng, and Reihaneh Safavi-Naini. "Privacy-preserving verifiable delegation of polynomial and matrix functions." Journal of Mathematical Cryptology 14, no. 1 (2020): 153–71. http://dx.doi.org/10.1515/jmc-2018-0039.
Full textSalako, Ademola Oluwaseun, Temilade Oluwatoyin Adesokan-Imran, Olufisayo Juliana Tiwo, Olufunke Cynthia Metibemu, Ogechukwu Scholastica Onyenaucheya, and Oluwaseun Oladeji Olaniyi. "Securing Confidentiality in Distributed Ledger Systems with Secure Multi-party Computation for Financial Data Protection." Journal of Engineering Research and Reports 27, no. 3 (2025): 352–73. https://doi.org/10.9734/jerr/2025/v27i31439.
Full textYu, Mingfei, Dewmini Sudara Marakkalage, and Giovanni De Micheli. "Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation." Cryptography 7, no. 4 (2023): 61. http://dx.doi.org/10.3390/cryptography7040061.
Full textGascón, Adrià, Phillipp Schoppmann, Borja Balle, et al. "Privacy-Preserving Distributed Linear Regression on High-Dimensional Data." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 345–64. http://dx.doi.org/10.1515/popets-2017-0053.
Full textAlmashaqbeh, Ghada, Fabrice Benhamouda, Seungwook Han, et al. "Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 528–48. http://dx.doi.org/10.2478/popets-2021-0083.
Full textCheng, Nan, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, and Kazunari Tozawa. "Constant-Round Private Decision Tree Evaluation for Secret Shared Data." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 397–412. http://dx.doi.org/10.56553/popets-2024-0023.
Full textLi, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.
Full textLiu, Kun, and Chunming Tang. "Privacy-preserving Naive Bayes classification based on secure two-party computation." AIMS Mathematics 8, no. 12 (2023): 28517–39. http://dx.doi.org/10.3934/math.20231459.
Full textSaleem, Hamza, Amir Ziashahabi, Muhammad Naveed, and Salman Avestimehr. "Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 42–58. http://dx.doi.org/10.56553/popets-2024-0066.
Full textKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Full textDeuber, Dominic, Christoph Egger, Katharina Fech, et al. "My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 108–32. http://dx.doi.org/10.2478/popets-2019-0007.
Full textWei, Dongying, Dan Wang, Zhiheng Wang, and Yingyi Ma. "A Privacy-Preserving Testing Framework for Copyright Protection of Deep Learning Models." Electronics 13, no. 1 (2023): 133. http://dx.doi.org/10.3390/electronics13010133.
Full textAaraj, Najwa, Abdelrahaman Aly, Tim Güneysu, et al. "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 1 (2024): 1–36. https://doi.org/10.46586/tches.v2025.i1.1-36.
Full textWagh, Sameer, Divya Gupta, and Nishanth Chandran. "SecureNN: 3-Party Secure Computation for Neural Network Training." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 26–49. http://dx.doi.org/10.2478/popets-2019-0035.
Full textHuo, Yachao, Zongqu Zhao, Panke Qin, Shujing Wang, and Chengfu Zheng. "Post‐quantum secure two‐party computing protocols against malicious adversaries." Concurrency and Computation: Practice and Experience, October 4, 2023. http://dx.doi.org/10.1002/cpe.7923.
Full textLevi, Itamar, and Carmit Hazay. "Garbled Circuits from an SCA Perspective." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 6, 2023, 54–79. http://dx.doi.org/10.46586/tches.v2023.i2.54-79.
Full textNieminen, Raine, and Thomas Schneider. "Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires." Journal of Cryptology 36, no. 4 (2023). http://dx.doi.org/10.1007/s00145-023-09472-4.
Full textCui, Hongrui, Xiao Wang, Kang Yang, and Yu Yu. "Actively Secure Half-Gates with Minimum Overhead under Duplex Networks." Journal of Cryptology 38, no. 2 (2025). https://doi.org/10.1007/s00145-025-09539-4.
Full textTozawa, Kazunari, Hiraku Morita, and Takaaki Mizuki. "Single-shuffle card-based protocol with eight cards per gate and its extensions." Natural Computing, January 9, 2025. https://doi.org/10.1007/s11047-024-10006-5.
Full text"Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?" International Journal of Engineering 34, no. 4 (2021). http://dx.doi.org/10.5829/ije.2021.34.04a.12.
Full textDe Cock, Martine, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, and Ariel Todoki. "High performance logistic regression for privacy-preserving genome analysis." BMC Medical Genomics 14, no. 1 (2021). http://dx.doi.org/10.1186/s12920-020-00869-9.
Full textNie, Chenfei, Zhipeng Zhou, Mianxiong Dong, Kaoru Ota, and Qiang Li. "EPIDL: Towards efficient and privacy‐preserving inference in deep learning." Concurrency and Computation: Practice and Experience, April 4, 2024. http://dx.doi.org/10.1002/cpe.8110.
Full textLi, Jinguo, Yan Yan, Kai Zhang, Chunlin Li, and Peichun Yuan. "PCIR: Privacy‐Preserving Convolutional Neural Network Inference With Rapid Responsiveness." Computational Intelligence 41, no. 2 (2025). https://doi.org/10.1111/coin.70030.
Full textOng, Toan, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray, and Michael Kahn. "Scalable Secure Privacy-Preserving Record Linkage (PPRL) Methods Using Cloud-based Infrastructure." International Journal of Population Data Science 3, no. 4 (2018). http://dx.doi.org/10.23889/ijpds.v3i4.638.
Full text