Secure outsourced computation

N Smart - US Patent App. 12/827,247, 2012 - Google Patents
0001. This invention relates to cryptography, and in par ticular relates to a method and a
system that allows out Sourced multi-party computation to be performed in a secure way …

Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

[PDF][PDF] Secure outsourced computation in a multi-tenant cloud

S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of
any function to a cluster of n machines in such a way that no adversary that corrupts at most …

A framework for outsourcing of secure computation

TP Jakobsen, JB Nielsen, C Orlandi - Proceedings of the 6th edition of …, 2014 - dl.acm.org
We study the problem of how to efficiently outsource a sensitive computation on secret
inputs to a number of untrusted workers, under the assumption that at least one worker is …

Multi-party computation services

GB Roth, AD Dokey - US Patent 9,577,829, 2017 - Google Patents
BACKGROUND Multi-party computation is a field of cryptographic research with a goal to
allow multiple mutually-distrustful parties to compute a function while simultaneously …

Outsourcing secure two‐party computation as a black box

H Carter, B Mood, P Traynor… - Security and …, 2016 - Wiley Online Library
Secure multiparty computation (SMC) offers a technique to preserve functionality and data
privacy in mobile applications. Current protocols that make this costly cryptographic …

Mix and match: A new approach to secure multiparty computation

BM Jakobsson, A Juels - US Patent 6,772,339, 2004 - Google Patents
The above-identified problems are solved and a technical advance is achieved in the art by
providing an innovative method for Secure multiparty computation which dispenses with the …

Outsourcing multi-party computation

S Kamara, P Mohassel, M Raykova - Cryptology ePrint Archive, 2011 - eprint.iacr.org
We initiate the study of secure multi-party computation (MPC) in a server-aided setting,
where the parties have access to a single server that (1) does not have any input to the …

Commodity-based cryptography

D Beaver - Proceedings of the twenty-ninth annual ACM …, 1997 - dl.acm.org
We introduce a new paradigm for the efficient design of protocols for secure joint
computation requiring minimal interaction. Instead ofrelying on trusted and specialized …

[图书][B] Trust extension as a mechanism for secure code execution on commodity computers

BJ Parno - 2014 - dl.acm.org
From the Preface As society rushes to digitize sensitive information and services, it is
imperative that we adopt adequate security protections. However, such protections …