Towards efficient private distributed computation on unbounded input streams
In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay,...
Main Authors: | Dolev Shlomi, Garay Juan, Gilboa Niv, Kolesnikov Vladimir, Yuditsky Yelena |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2015-06-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2013-0039 |
Similar Items
-
Predicate signatures from pair encodings via dual system proof technique
by: Nandi Mridul, et al.
Published: (2019-10-01) -
On the security of joint signature and encryption revisited
by: Nandi Mridul, et al.
Published: (2016-12-01) -
A note on secure multiparty computation via higher residue symbols
by: Cascudo Ignacio, et al.
Published: (2021-01-01) -
Context-Aware Access Control Model for Privacy Support in Mobile-Based Assisted Living
by: Smirnov Alexander, et al.
Published: (2015-08-01) -
A secure anonymous proxy signcryption scheme
by: Saraswat Vishal, et al.
Published: (2017-06-01)