1982 749 AC Yao, Protocols for secure computations Protocols for Secure Computations (extended abstract) Andrew C. Yao University of California Berkeley, California 94720 1 Introduction Two millionaires wish to
In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and analysis of an information-theoretic secure oblivious linear evaluation (OLE), namely q O L E {\\sf qOLE} in the quantum domain, and show that our q O L E {\\sf qOLE...
Yao AC-C (1982) Protocols for secure computations. In: 23rd Annual symposium on foundations of computer science, vol 82, pp 160–164 Micali S, Goldreich O, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing. ACM, pp...
Moreover, generic protocols like ours can be used directly for performing more complex secure computations, something we demonstrate by adding a simple information-auditing mechanism to our PSI protocols.Yan Huang, David Evans, Jonathan KatzNdss...
These additive shares serve the purpose of secure input for follow-up analysis, where they can be recombined in the encrypted domain to perform computations on the secure inner join.High-over stepsWe first aim to find exact matches securely, i.e., matches where all of the identifying ...
Security properties for Protocol 2: Secure Boot. [P2.1]Only a legitimate ETCB is allowed to start on the platform. $$\begin{aligned}&\forall \textit{inst}, \textit{code}_E, code_\textit{O}', \textit{code}_E', t_2.\quad \text {EtcbStarts}(\textit{inst}, \textit{code}_E)@t...
that uses a keyed message authentication code (MAC). Secure hash functions are used for MAC computations. The record protocol can operate without a MAC, but it is generally only used in this mode while another protocol is using the record protocol as a transport for negotiating security ...
SecureNN: 3-Party Secure Computation for Neural Network Training Sameer Wagh, Divya Gupta, and Nishanth Chandran Secure multi-party computation (SMC/MPC) provides a cryptographically secure framework for computations where the privacy of data is a requirement. MPC protocols enable computations over this...
Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of...
For example, some devices may be configured to initiate secure communication, while other devices may be configured to respond to a request for secure communication, but not to require security. Still other devices, while security capable, may neither initiate nor respond securely. In practice, ...