Secure multi-party computation problems and their applications: a review and open problems

W Du, MJ Atallah - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …

Public-key cryptography

A Salomaa - 2013 - books.google.com
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal
discovery in 1977 of public-key cryptography and applications in computers and …

Cryptflow2: Practical 2-party secure inference

D Rathee, M Rathee, N Kumar, N Chandran… - Proceedings of the …, 2020 - dl.acm.org
We present CrypTFlow2, a cryptographic framework for secure inference over realistic Deep
Neural Networks (DNNs) using secure 2-party computation. CrypTFlow2 protocols are both …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Extending oblivious transfers efficiently

Y Ishai, J Kilian, K Nissim, E Petrank - Annual International Cryptology …, 2003 - Springer
We consider the problem of extending oblivious transfers: Given a small number of oblivious
transfers “for free,” can one implement a large number of oblivious transfers? Beaver has …

Minimum disclosure proofs of knowledge

G Brassard, D Chaum, C Crépeau - Journal of computer and system …, 1988 - Elsevier
Protocols are given for allowing a “prover” to convince a “verifier” that the prover knows
some verifiable secret information, without allowing the verifier to learn anything about the …

XPIR: Private information retrieval for everyone

CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …

Oblivious transfer and polynomial evaluation

M Naor, B Pinkas - Proceedings of the thirty-first annual ACM symposium …, 1999 - dl.acm.org
We describe efficient constructions for two oblivious twoparty computation problems: l-out-of-
N Oblivious Transfer &d 'Oblivious Poly&nial Evaluation. The oblivious polynomial …

Priced oblivious transfer: How to sell digital goods

B Aiello, Y Ishai, O Reingold - International Conference on the Theory and …, 2001 - Springer
We consider the question of protecting the privacy of customers buying digital goods. More
specifically, our goal is to allow a buyer to purchase digital goods from a vendor without …

[图书][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques

MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …