Blockchain-assisted Verifiable Secure Multi-Party Data Computing

H Pei, P Yang, M Du, Z Liang, Z Hu - Computer Networks, 2024 - Elsevier
Secure multi-party computation (SMPC) is a crucial technology that supports privacy
preservation, enabling multiple users to perform computations on any function without …

PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality

Q Yang, Y Yang, S Xu, R Guo, H Xian, Y Lin… - Journal of Network and …, 2024 - Springer
Contact tracing (CT) is an indispensable tool in controlling infectious disease outbreaks,
which is regarded as the most effective weapon for curbing the spread of viruses. Due to the …

[HTML][HTML] SMPTC3: Secure Multi-Party Protocol Based Trusted Cross-Chain Contracts

H Mao, T Nie, M Yu, X Dong, X Li, G Yu - Mathematics, 2024 - mdpi.com
We propose an innovative approach called SMPTC3, designed specifically to enhance
security and privacy in cross-chain transaction verification. This approach addresses multi …

Toward a Framework for Cost-Effective and Publicly Verifiable Confidential Computations in Blockchain

D Morales, I Agudo, J Lopez - IEEE Communications Magazine, 2024 - ieeexplore.ieee.org
Blockchain technologies have introduced a compelling paradigm for a new understanding of
security through decentralized networks and consensus mechanisms. However, they need …

ReplayMPC: A Fast Failure Recovery Protocol for Secure Multiparty Computation Applications using Blockchain

OG Bautista, K Akkaya, S Homsi - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Although recent performance improvements to Secure Multiparty Computation (SMPC)
made it a practical solution for complex applications such as privacy-preserving machine …

[PDF][PDF] Blockchain security and privacy examined: Threats, challenges, applications, and tools

A Alghuried, M Alkinoon, M Mohaisen… - … and Practice, ACM …, 2024 - davidmohaisen.github.io
Blockchain technology has heralded a new era in digital innovation, revolutionizing our
approach to designing and building distributed applications in the digital sphere. Essentially …

Privacy-Preserving Oriented Design for Multi-Modality Models using FL

M Alduniawi, K Akkaya, R Sun - 2023 5th IEEE International …, 2023 - ieeexplore.ieee.org
Mobile apps increasingly use federated learning for the convenience of training, user
privacy preservation, and ease to regulation compliance. Recent models consider multi …

Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party Computation

A Desai, OG Bautista, K Akkaya - … Design for Mobile Networks and Mobile …, 2023 - dl.acm.org
As drones become more widely available, they find applications in many different fields. One
of the most promising applications of drones is to use them in deliveries of items/food within …

Public Verifiable Privacy-Preserving Multi-Party Computation on Blockchain

Z Zhang, L Chen, X Jiang… - 2024 9th International …, 2024 - ieeexplore.ieee.org
This paper introduces a novel framework for verifiable privacy-preserving computation on
the blockchain, addressing the challenges of managing confidential transactions within the …

[PDF][PDF] Efficient First-Price Sealed E-Auction Protocol Under Secure Multi-Party Computational Malicious Model

DW Zhou, SZ Cao, X Zhao, DD Xing, Z Wang - Journal of Computers, 2024 - csroc.org.tw
To solve the problems of existing e-auction protocols such as semi-trustworthiness of
outsourced third parties, collusive attacks among participants, unsatisfactory decentralized …