The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give...
A.C.-C. Yao, Protocols for secure computations (extended abstract), in 23rd FOCS. (IEEE Computer Society Press, November 1982), pp. 160–164. Download references Author information Authors and Affiliations Department of Computer Science, Bar-Ilan University, Ramat Gan, Israel Ran Cohen Department...
The most unusual feature of our solution is its ability to support a mutual signature of two parties using a single public key by repurposing the confirmation pre-image for signing the verifier’s approval, see “MAWS protocol” section. We propose an extreme version of this mutual protocol, w...
These additive shares serve the purpose of secure input for follow-up analysis, where they can be recombined in the encrypted domain to perform computations on the secure inner join.High-over stepsWe first aim to find exact matches securely, i.e., matches where all of the identifying ...
Yao A.C. Protocols for secure computations in: 23rd Annual Symposium on Foundations of Computer Science, 1982, SFCS'08, IEEE (1982) pp. 160–164 Google Scholar Yao et al, 2013 Yao B., Li F., Xiao X. Secure nearest neighbor revisited in: Proc. of 29th IEEE ICDE (2013) pp. 733–...
the player rearranges the firstkcards into their reverse order while leaving the remainingn−kcards unchanged. The player repeatedly applies such prefix reversals to the current sequence until the number on the first card in the sequence becomes 1. For example, consider the case wheren=5, and...
Recently, two protocols for secure outsourcing scientific computations, i.e., linear equation solving and linear programming solving, to the cloud were proposed. In this paper, we improve the work by proposing new protocols that achieve significant performance gains. For linear equation solving ...
Moreover, generic protocols like ours can be used directly for performing more complex secure computations, something we demonstrate by adding a simple information-auditing mechanism to our PSI protocols.Yan Huang, David Evans, Jonathan KatzNdss...
Owoh and Singh (2019) applied this concept to mobile crowd sensing for secure data transmission between mobile blockchain clients and edge nodes. In this scenario, the edge nodes play a crucial role by performing proof-of-work computations on the sensor data received from the blockchain clients...
Secure hash functions are used for MAC computations. The record protocol can operate without a MAC, but it is generally only used in this mode while another protocol is using the record protocol as a transport for negotiating security parameters. IETF RFC 2246 SSL 3.0 SSL 3.0 was a Netscape ...