European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Scalable Oblivious Data Analytics

Resultado final

Publicaciones

Philips, Big Data & healthcare

Autores: Meilof Veeningen
Publicado en: 2017
Editor: "Workshop ""Big data og følsomme data"""

SODA - Scalable Oblivious Data Analytics

Autores: Meilof Veeningen
Publicado en: 2017
Editor: Information and Networking Days on Horizon 2020 Big Data Public-Private Partnership topics 2017

Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation

Autores: Meilof Veeningen
Publicado en: 2017, Página(s) 21-39
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-57339-7_2

Pinocchio-Based Adaptive zk-SNARKs, Secure Adaptive Function Evaluation and Privacy-Preserving Medical Research

Autores: Meilof Veeningen
Publicado en: 2017
Editor: TPMPC 2017

On the Computational Overhead of MPC with Dishonest Majority

Autores: Jesper Buus Nielsen, Samuel Ranellucci
Publicado en: 2017, Página(s) 369-395
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-54388-7_13

PySNARK

Autores: Meilof Veeningen
Publicado en: 2017
Editor: GitHub

Distributed Privacy-Preserving Data Mining in the Medical Domain

Autores: Meilof Veeningen
Publicado en: 2017
Editor: Workshop on Decentralized Machine Learning, Optimization and Privacy

Sharing Secrets (Without Giving Them Away)

Autores: Arnout Jaspers
Publicado en: 2017
Editor: ACM News

SODA - Scalable Oblivious Data Analytics

Autores: Milan Petkovic
Publicado en: 2016
Editor: """Big Data Value Valencia Summit 2016: session on Data Protection - privacy-preserving big data technologies"""

Geheimen delen met partners die je niet vertrouwt

Autores: Arnout Jaspers
Publicado en: 2017
Editor: NEMO Kennislink

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead

Autores: Satrajit Ghosh (Aarhus University), Jesper Buus Nielsen (Aarhus University), Tobias Nilges (Aarhus University)
Publicado en: 2017
Editor: ASIACRYPT 2017

DUPLO - Unifying Cut-and-Choose for Garbled Circuits

Autores: Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 3-20, ISBN 9781-450349468
Editor: ACM Press
DOI: 10.1145/3133956.3133991

An Efficient Pairing-Based Shuffle Argument

Autores: Prastudy Fauzi (Aarhus University), Helger Lipmaa (University of Tartu), Janno Siim (University of Tartu and STACC), Michał Zając (University of Tartu)
Publicado en: 2017
Editor: ASIACRYPT 2017

Revealing Encryption for Partial Ordering

Autores: Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, and Yifan Song
Publicado en: 2017
Editor: IMA Cryptography and Coding 2017

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer

Autores: Carmit Hazay (Bar-Ilan University), Peter Scholl (Aarhus University), Eduardo Soria-Vazquez (University of Bristol)
Publicado en: 2017
Editor: ASIACRYPT 2017

When It’s All Just Too Much: Outsourcing MPC-Preprocessing

Autores: Peter Scholl (Aarhus University), Nigel Smart (University of Bristol), Tim Wood (University of Bristol)
Publicado en: 2017
Editor: IMA Cryptography and Coding 2017

Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation

Autores: Meilof VEENINGEN, Supriyo CHATTERJEA, Anna Zsófia HORVÁTH, Gerald SPINDLERb, Eric BOERSMA, Peter van der SPEK, Onno van der GALIËN, Job GUTTELING, Wessel KRAAIJ, Thijs VEUGEN
Publicado en: 2018
Editor: MIE 2018

Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO

Autores: Jesper Buus Nielsen (Aarhus University) Thomas Schneider (Technische Universität Darmstadt) Roberto Trifiletti (Aarhus University)
Publicado en: 2017
Editor: NDSS 2017

Compact Zero-Knowledge Proofs of Small Hamming Weight

Autores: Ivan Damgård, Ji Lao, Sabine Oechsner, Mark Simkin, Peter Scholl
Publicado en: 2018
Editor: PKC 2018

Introduction to Secure Multiparty Computation

Autores: Niek Bouman, Berry Schoenmakers
Publicado en: 2017
Editor: Workshop Data Mining with Secure Computation,

Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments

Autores: Tore Frederiksen, Benny Pinkas, Avishay Yanai
Publicado en: 2018
Editor: PKC 2018

PySNARK announcement (flash presentation)

Autores: Meilof Veeningen
Publicado en: 2018
Editor: Real World Crypto 2018

Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs

Autores: Peter Scholl
Publicado en: 2018
Editor: PKC 2018

Data Mining with Secure Computation

Autores: Niek Bouman, Mykola Pechenizkiy
Publicado en: 2017
Editor: ECML PKDD 2017

TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation

Autores: Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
Publicado en: 2017
Editor: ACM CCS 2017

Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings

Autores: Ivan Damgård, Claudio Orlandi, Mark Simkin
Publicado en: 2018
Editor: CRYPTO 2018

SPDZ_2^k: Efficient MPC mod 2^k for Dishonest Majority

Autores: Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing
Publicado en: 2018
Editor: CRYPTO 2018

Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries

Autores: Tore Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
Publicado en: 2018
Editor: TPMPC 2018

Efficient MPC From Syndrome Decoding

Autores: Peter Scholl
Publicado en: 2018
Editor: TPMPC 2018

Secure Linear Algebra over F_p and Q

Autores: Frank Blom, Niek Bouman, Berry Schoenmakers, Niels de Vreede
Publicado en: 2018
Editor: TPMPC 2018

TinyKeys: A New Approach to Efficient Multi-Party Computation

Autores: Carmit Hazay, Emmanuela Orsini, Peter Scholl , Eduardo Soria-Vazquez
Publicado en: 2018
Editor: CRYPTO 2018

Conclave - secure multi-party computation on big data

Autores: Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros
Publicado en: Proceedings of the Fourteenth EuroSys Conference 2019 CD-ROM on ZZZ - EuroSys '19, 2019, Página(s) 1-18, ISBN 9781-450362818
Editor: ACM Press
DOI: 10.1145/3302424.3303982

Sharing Information with Competitors

Autores: Brânzei, Simina; Orlandi, Claudio; Yang, Guang
Publicado en: Edición 1, 2018
Editor: Cornell University

Lower Bounds for Oblivious Data Structures

Autores: Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus
Publicado en: Edición 1, 2018
Editor: Cornell University

Enabling analytics on sensitive medical data with secure multi-party computation

Autores: Veeningen, M.; Chatterjea, S.; Horváth, A.Z.; Spindler, G.; Boersma, E.; Spek, van der, P.; Galiën, van der, O.; Gutteling, J.; Kraaij, W.; Veugen, T.
Publicado en: STARTPAGE=76;ENDPAGE=80;TITLE=Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, Edición 1, 2018
Editor: Medical Information Europe

Computer-Aided Proofs for Multiparty Computation with Active Security

Autores: Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub
Publicado en: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Página(s) 119-131, ISBN 978-1-5386-6680-7
Editor: IEEE
DOI: 10.1109/CSF.2018.00016

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning

Autores: Ivan Damgard, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
Publicado en: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Página(s) 1102-1120, ISBN 978-1-5386-6660-9
Editor: IEEE
DOI: 10.1109/sp.2019.00078

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

Autores: Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Publicado en: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Página(s) 291-308, ISBN 9781-450367479
Editor: ACM
DOI: 10.1145/3319535.3354255

Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries

Autores: Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Edición 10992, 2018, Página(s) 331-361, ISBN 978-3-319-96880-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96881-0_12

Revealing Encryption for Partial Ordering

Autores: Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song
Publicado en: Cryptography and Coding, Edición 10655, 2017, Página(s) 3-22, ISBN 978-3-319-71044-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-71045-7_1

Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs

Autores: Peter Scholl
Publicado en: Public-Key Cryptography – PKC 2018, Edición 10769, 2018, Página(s) 554-583, ISBN 978-3-319-76577-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-76578-5_19

An Efficient Pairing-Based Shuffle Argument

Autores: Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michał Zając
Publicado en: Advances in Cryptology – ASIACRYPT 2017, Edición 10625, 2017, Página(s) 97-127, ISBN 978-3-319-70696-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70697-9_4

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead

Autores: Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
Publicado en: Advances in Cryptology – ASIACRYPT 2017, Edición 10624, 2017, Página(s) 629-659, ISBN 978-3-319-70693-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70694-8_22

Compact Zero-Knowledge Proofs of Small Hamming Weight

Autores: Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
Publicado en: Public-Key Cryptography – PKC 2018, Edición 10770, 2018, Página(s) 530-560, ISBN 978-3-319-76580-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_18

Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings

Autores: Ivan Damgård, Claudio Orlandi, Mark Simkin
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Edición 10992, 2018, Página(s) 799-829, ISBN 978-3-319-96880-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96881-0_27

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer

Autores: Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – ASIACRYPT 2017, Edición 10624, 2017, Página(s) 598-628, ISBN 978-3-319-70693-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70694-8_21

TinyKeys: A New Approach to Efficient Multi-Party Computation

Autores: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Edición 10993, 2018, Página(s) 3-33, ISBN 978-3-319-96877-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_1

Yes, There is an Oblivious RAM Lower Bound!

Autores: Kasper Green Larsen, Jesper Buus Nielsen
Publicado en: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Edición 10992, 2018, Página(s) 523-542, ISBN 978-3-319-96880-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96881-0_18

Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification

Autores: Peter Sebastian Nordholt, Meilof Veeningen
Publicado en: Applied Cryptography and Network Security, Edición 10892, 2018, Página(s) 321-339, ISBN 978-3-319-93386-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_17

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

Autores: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Publicado en: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Edición 11274, 2018, Página(s) 86-117, ISBN 978-3-030-03331-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-03332-3_4

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles