Access control in publicly verifiable outsourced computation

J Alderman, C Janson, C Cid, J Crampton - Proceedings of the 10th ACM …, 2015 - dl.acm.org
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources
to delegate computations to more powerful external servers, and to verify the correctness of …

Secure multiparty computation from SGX

R Bahmani, M Barbosa, F Brasser, B Portela… - … Conference on Financial …, 2017 - Springer
In this paper we show how Isolated Execution Environments (IEE) offered by novel
commodity hardware such as Intel's SGX provide a new path to constructing general secure …

Verifiable outsourced computation: A survey

R Gennaro - Proceedings of the ACM Symposium on Principles of …, 2017 - dl.acm.org
I will review recent (and not so recent) research on the topic of Verifiable Outsourced
Computation. The problem of verifying the correctness of computations done by untrusted …

Secure two-party computation via cut-and-choose oblivious transfer

Y Lindell, B Pinkas - Journal of cryptology, 2012 - Springer
Protocols for secure two-party computation enable a pair of parties to compute a function of
their inputs while preserving security properties such as privacy, correctness and …

[PDF][PDF] Making argument systems for outsourced computation practical (sometimes).

STV Setty, R McPherson, AJ Blumberg, M Walfish - NDSS, 2012 - ndss-symposium.org
This paper describes the design, implementation, and evaluation of a system for performing
verifiable outsourced computation. It has long been known that (1) this problem can be …

Secure multiparty computation

KB Frikken - Algorithms and theory of computation handbook …, 2010 - dl.acm.org
A plethora of mutually beneficial information collaboration opportunities exist when
organizations and individuals share information. Some examples of such collaborations …

[PDF][PDF] On the composition of secure multi-party protocols

Y Lindell - 2002 - Citeseer
In the setting of multi-party computation, sets of two or more parties with private inputs wish
to jointly compute some (predetermined) function of their inputs. This computation should be …

Practical applications of secure multiparty computation

R Talviste - Applications of secure multiparty computation, 2015 - ebooks.iospress.nl
As secure multiparty computation technology becomes more mature, we see more and more
practical applications where computation moves from a lab setting to an actual deployment …

Multi-party computation with hybrid security

M Fitzi, T Holenstein, J Wullschleger - … on the Theory and Applications of …, 2004 - Springer
It is well-known that n players connected only by pairwise secure channels can achieve
multi-party computation secure against an active adversary if and only if t< n/2 of the players …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …