Academic literature on the topic 'Secure multi-party protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure multi-party protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure multi-party protocols"
Das, Nayana, and Goutam Paul. "Secure multi-party quantum conference and XOR computation." quantum Information and Computation 21, no. 3&4 (2021): 0203–32. http://dx.doi.org/10.26421/qic21.3-4-2.
Full textPitalúa-García, Damián. "Unconditionally secure relativistic multi-party biased coin flipping and die rolling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2252 (2021): 20210203. http://dx.doi.org/10.1098/rspa.2021.0203.
Full textGordon, S. Dov, Carmit Hazay, and Phi Hung Le. "Fully Secure PSI via MPC-in-the-Head." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 291–313. http://dx.doi.org/10.56553/popets-2022-0073.
Full textLu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (2024): 80. http://dx.doi.org/10.3390/e26010080.
Full textRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Full textWang, Ning, Xinying Tian, Xiaodong Zhang, and Song Lin. "Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption." Photonics 10, no. 5 (2023): 558. http://dx.doi.org/10.3390/photonics10050558.
Full textAlper, Handan Kılınç, and Alpteki̇n Küpçü. "Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–34. http://dx.doi.org/10.1145/3477530.
Full textSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (2020): 1152. http://dx.doi.org/10.3390/e22101152.
Full textZhu, Zong-Wu, and Ru-Wei Huang. "A secure multi-party computation protocol without CRS supporting multi-bit encryption." PLOS ONE 17, no. 3 (2022): e0265572. http://dx.doi.org/10.1371/journal.pone.0265572.
Full textShmueli, Erez, and Tamir Tassa. "Mediated Secure Multi-Party Protocols for Collaborative Filtering." ACM Transactions on Intelligent Systems and Technology 11, no. 2 (2020): 1–25. http://dx.doi.org/10.1145/3375402.
Full textDissertations / Theses on the topic "Secure multi-party protocols"
Boyle, Elette Chantae. "Secure multi-party protocols under a modern lens." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82436.
Full textColbeck, Roger Andrew. "Quantum and relativistic protocols for secure multi-party computation." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612940.
Full textZhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.
Full textMusic, Luka. "Multi-Party Quantum Cryptography : from Folklore to Real-World." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.
Full textLin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.
Full textTurban, Tiina. "A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25874.
Full textZhang, Ping Echo, and 张萍. "Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617898.
Full textHuang, Wen Kai, and 黃文楷. "A Protocol Description Language for Secure Multi-Party Computation." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/57221064473475505376.
Full textAjith, S. "Fast Actively Secure OT Extension for Short Secrets." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3623.
Full textAjith, S. "Fast Actively Secure OT Extension for Short Secrets." Thesis, 2017. http://etd.iisc.ernet.in/2005/3623.
Full textBooks on the topic "Secure multi-party protocols"
Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1.
Full textLindell, Yehuda. Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13246.
Full textOnieva, José A., Javier Lopez, and Jianying Zhou. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-75630-1.
Full textCătălin V. Bîrjoveanu and Mirela Bîrjoveanu. Secure Multi-Party e-Commerce Protocols. Springer International Publishing AG, 2022.
Find full textZhou, Jianying, and José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2008.
Find full textZhou, Jianying, and José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2010.
Find full textLindell, Yehuda. Composition of Secure Multi-Party Protocols: A Comprehensive Study. Springer London, Limited, 2003.
Find full textComposition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science). Springer, 2003.
Find full textBook chapters on the topic "Secure multi-party protocols"
Merino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.
Full textBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Two-Party E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_2.
Full textLindell, Yehuda. "3. Secure Computation without Agreement." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_3.
Full textLindell, Yehuda. "4. Universally Composable Multi-party Computation." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_4.
Full textLindell, Yehuda. "1. Introduction." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_1.
Full textLindell, Yehuda. "2. The Composition of Authenticated Byzantine Agreement." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_2.
Full textBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Conclusions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_6.
Full textBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Multi-party E-Commerce Protocols for Complex Transactions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_3.
Full textBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Formal Verification of Multi-party Fair Exchange E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_5.
Full textBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Introduction." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_1.
Full textConference papers on the topic "Secure multi-party protocols"
Aljumah, Feras, Andrei Soeanu, Wen Ming Liu, and Mourad Debbabi. "Protocols for secure multi-party private function evaluation." In 2015 First International Conference on Anti-Cybercrime (ICACC). IEEE, 2015. http://dx.doi.org/10.1109/anti-cybercrime.2015.7351946.
Full textShmueli, Erez, and Tamir Tassa. "Secure Multi-Party Protocols for Item-Based Collaborative Filtering." In RecSys '17: Eleventh ACM Conference on Recommender Systems. ACM, 2017. http://dx.doi.org/10.1145/3109859.3109881.
Full textLuo, Wenjun, and Xiang Li. "A study of secure multi-party elementary function computation protocols." In the 3rd international conference. ACM Press, 2004. http://dx.doi.org/10.1145/1046290.1046293.
Full textMovahedi, Mahnush, Jared Saia, and Mahdi Zamani. "Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling." In 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2015. http://dx.doi.org/10.1109/icdcs.2015.116.
Full textPinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf, and Anderson C. A. Nascimento. "Universally Composable Committed Oblivious Transfer With A Trusted Initializer." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Full textPettai, Martin, and Peeter Laud. "Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries." In 2015 IEEE 28th Computer Security Foundations Symposium (CSF). IEEE, 2015. http://dx.doi.org/10.1109/csf.2015.13.
Full textKerschbaum, Florian, Daniel Dahlmeier, Axel Schröpfer, and Debmalya Biswas. "On the practical importance of communication complexity for secure multi-party computation protocols." In the 2009 ACM symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1529282.1529730.
Full textLiu, Wen, Shou-shan Luo, and Yong-bin Wang. "Secure Multi-Party Comparing Protocol Based on Multi-Threshold Secret Sharing Scheme." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601327.
Full textShi, Lei, Yonglong Luo, and Caiyun Zhang. "Secure Two-Party Multi-Dimensional Vector Comparison Protocol." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302846.
Full textXiao, Haiyan, and Xiaoyuan Yang. "Secure Multi-party Confidential Protocol of Matrix Factorization." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.89.
Full text