Rezultaty Documents, reports (11) User studies analysis User studies analysis Use-case-specific legal aspects Use-case-specific legal aspects WP1 State of the art State of the art General legal aspects General legal aspects Special Purpose MPC Protocols Special Purpose MPC Protocols Differential Privacy Differential Privacy Use-case-specific algorithms Use-case-specific algorithms WP2 State of the art State of the art General MPC Framework General MPC Framework User studies plan User studies plan Distributed/streaming algorithms Distributed/streaming algorithms Websites, patent fillings, videos etc. (2) Publication of hacking challenge Publication of hacking challenge Public website Public website Other (2) Proof-of-concept for results of tasks 1.2/2.2 Proof-of-concept for results of tasks 1.2/2.2 Proof-of-concept for results of tasks 1.3/2.3 Proof-of-concept for results of tasks 1.3/2.3 Publikacje Other (10) Philips, Big Data & healthcare Autorzy: Meilof Veeningen Opublikowane w: 2017 Wydawca: "Workshop ""Big data og følsomme data""" SODA - Scalable Oblivious Data Analytics Autorzy: Meilof Veeningen Opublikowane w: 2017 Wydawca: Information and Networking Days on Horizon 2020 Big Data Public-Private Partnership topics 2017 Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation Autorzy: Meilof Veeningen Opublikowane w: 2017, Page(s) 21-39 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-57339-7_2 Pinocchio-Based Adaptive zk-SNARKs, Secure Adaptive Function Evaluation and Privacy-Preserving Medical Research Autorzy: Meilof Veeningen Opublikowane w: 2017 Wydawca: TPMPC 2017 On the Computational Overhead of MPC with Dishonest Majority Autorzy: Jesper Buus Nielsen, Samuel Ranellucci Opublikowane w: 2017, Page(s) 369-395 Wydawca: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-54388-7_13 PySNARK Autorzy: Meilof Veeningen Opublikowane w: 2017 Wydawca: GitHub Distributed Privacy-Preserving Data Mining in the Medical Domain Autorzy: Meilof Veeningen Opublikowane w: 2017 Wydawca: Workshop on Decentralized Machine Learning, Optimization and Privacy Sharing Secrets (Without Giving Them Away) Autorzy: Arnout Jaspers Opublikowane w: 2017 Wydawca: ACM News SODA - Scalable Oblivious Data Analytics Autorzy: Milan Petkovic Opublikowane w: 2016 Wydawca: """Big Data Value Valencia Summit 2016: session on Data Protection - privacy-preserving big data technologies""" Geheimen delen met partners die je niet vertrouwt Autorzy: Arnout Jaspers Opublikowane w: 2017 Wydawca: NEMO Kennislink Conference proceedings (28) Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead Autorzy: Satrajit Ghosh (Aarhus University), Jesper Buus Nielsen (Aarhus University), Tobias Nilges (Aarhus University) Opublikowane w: 2017 Wydawca: ASIACRYPT 2017 DUPLO - Unifying Cut-and-Choose for Garbled Circuits Autorzy: Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti Opublikowane w: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 3-20, ISBN 9781-450349468 Wydawca: ACM Press DOI: 10.1145/3133956.3133991 An Efficient Pairing-Based Shuffle Argument Autorzy: Prastudy Fauzi (Aarhus University), Helger Lipmaa (University of Tartu), Janno Siim (University of Tartu and STACC), Michał Zając (University of Tartu) Opublikowane w: 2017 Wydawca: ASIACRYPT 2017 Revealing Encryption for Partial Ordering Autorzy: Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, and Yifan Song Opublikowane w: 2017 Wydawca: IMA Cryptography and Coding 2017 Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Autorzy: Carmit Hazay (Bar-Ilan University), Peter Scholl (Aarhus University), Eduardo Soria-Vazquez (University of Bristol) Opublikowane w: 2017 Wydawca: ASIACRYPT 2017 When It’s All Just Too Much: Outsourcing MPC-Preprocessing Autorzy: Peter Scholl (Aarhus University), Nigel Smart (University of Bristol), Tim Wood (University of Bristol) Opublikowane w: 2017 Wydawca: IMA Cryptography and Coding 2017 Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation Autorzy: Meilof VEENINGEN, Supriyo CHATTERJEA, Anna Zsófia HORVÁTH, Gerald SPINDLERb, Eric BOERSMA, Peter van der SPEK, Onno van der GALIËN, Job GUTTELING, Wessel KRAAIJ, Thijs VEUGEN Opublikowane w: 2018 Wydawca: MIE 2018 Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO Autorzy: Jesper Buus Nielsen (Aarhus University) Thomas Schneider (Technische Universität Darmstadt) Roberto Trifiletti (Aarhus University) Opublikowane w: 2017 Wydawca: NDSS 2017 Compact Zero-Knowledge Proofs of Small Hamming Weight Autorzy: Ivan Damgård, Ji Lao, Sabine Oechsner, Mark Simkin, Peter Scholl Opublikowane w: 2018 Wydawca: PKC 2018 Introduction to Secure Multiparty Computation Autorzy: Niek Bouman, Berry Schoenmakers Opublikowane w: 2017 Wydawca: Workshop Data Mining with Secure Computation, Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments Autorzy: Tore Frederiksen, Benny Pinkas, Avishay Yanai Opublikowane w: 2018 Wydawca: PKC 2018 PySNARK announcement (flash presentation) Autorzy: Meilof Veeningen Opublikowane w: 2018 Wydawca: Real World Crypto 2018 Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs Autorzy: Peter Scholl Opublikowane w: 2018 Wydawca: PKC 2018 Data Mining with Secure Computation Autorzy: Niek Bouman, Mykola Pechenizkiy Opublikowane w: 2017 Wydawca: ECML PKDD 2017 TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation Autorzy: Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti Opublikowane w: 2017 Wydawca: ACM CCS 2017 Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings Autorzy: Ivan Damgård, Claudio Orlandi, Mark Simkin Opublikowane w: 2018 Wydawca: CRYPTO 2018 SPDZ_2^k: Efficient MPC mod 2^k for Dishonest Majority Autorzy: Ronald Cramer, Ivan Damgård, Daniel Escudero, Peter Scholl, Chaoping Xing Opublikowane w: 2018 Wydawca: CRYPTO 2018 Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries Autorzy: Tore Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas Opublikowane w: 2018 Wydawca: TPMPC 2018 Efficient MPC From Syndrome Decoding Autorzy: Peter Scholl Opublikowane w: 2018 Wydawca: TPMPC 2018 Secure Linear Algebra over F_p and Q Autorzy: Frank Blom, Niek Bouman, Berry Schoenmakers, Niels de Vreede Opublikowane w: 2018 Wydawca: TPMPC 2018 TinyKeys: A New Approach to Efficient Multi-Party Computation Autorzy: Carmit Hazay, Emmanuela Orsini, Peter Scholl , Eduardo Soria-Vazquez Opublikowane w: 2018 Wydawca: CRYPTO 2018 Conclave - secure multi-party computation on big data Autorzy: Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros Opublikowane w: Proceedings of the Fourteenth EuroSys Conference 2019 CD-ROM on ZZZ - EuroSys '19, 2019, Page(s) 1-18, ISBN 9781-450362818 Wydawca: ACM Press DOI: 10.1145/3302424.3303982 Sharing Information with Competitors Autorzy: Brânzei, Simina; Orlandi, Claudio; Yang, Guang Opublikowane w: Issue 1, 2018 Wydawca: Cornell University Lower Bounds for Oblivious Data Structures Autorzy: Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus Opublikowane w: Issue 1, 2018 Wydawca: Cornell University Enabling analytics on sensitive medical data with secure multi-party computation Autorzy: Veeningen, M.; Chatterjea, S.; Horváth, A.Z.; Spindler, G.; Boersma, E.; Spek, van der, P.; Galiën, van der, O.; Gutteling, J.; Kraaij, W.; Veugen, T. Opublikowane w: STARTPAGE=76;ENDPAGE=80;TITLE=Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, Issue 1, 2018 Wydawca: Medical Information Europe Computer-Aided Proofs for Multiparty Computation with Active Security Autorzy: Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub Opublikowane w: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018, Page(s) 119-131, ISBN 978-1-5386-6680-7 Wydawca: IEEE DOI: 10.1109/CSF.2018.00016 New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning Autorzy: Ivan Damgard, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev Opublikowane w: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Page(s) 1102-1120, ISBN 978-1-5386-6660-9 Wydawca: IEEE DOI: 10.1109/sp.2019.00078 Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Autorzy: Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl Opublikowane w: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308, ISBN 9781-450367479 Wydawca: ACM DOI: 10.1145/3319535.3354255 Book chapters (12) Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries Autorzy: Tore Kasper Frederiksen, Yehuda Lindell, Valery Osheter, Benny Pinkas Opublikowane w: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 331-361, ISBN 978-3-319-96880-3 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-96881-0_12 Revealing Encryption for Partial Ordering Autorzy: Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song Opublikowane w: Cryptography and Coding, Issue 10655, 2017, Page(s) 3-22, ISBN 978-3-319-71044-0 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-71045-7_1 Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs Autorzy: Peter Scholl Opublikowane w: Public-Key Cryptography – PKC 2018, Issue 10769, 2018, Page(s) 554-583, ISBN 978-3-319-76577-8 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-76578-5_19 An Efficient Pairing-Based Shuffle Argument Autorzy: Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michał Zając Opublikowane w: Advances in Cryptology – ASIACRYPT 2017, Issue 10625, 2017, Page(s) 97-127, ISBN 978-3-319-70696-2 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-70697-9_4 Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead Autorzy: Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges Opublikowane w: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 629-659, ISBN 978-3-319-70693-1 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-70694-8_22 Compact Zero-Knowledge Proofs of Small Hamming Weight Autorzy: Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin Opublikowane w: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 530-560, ISBN 978-3-319-76580-8 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-76581-5_18 Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings Autorzy: Ivan Damgård, Claudio Orlandi, Mark Simkin Opublikowane w: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 799-829, ISBN 978-3-319-96880-3 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-96881-0_27 Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Autorzy: Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez Opublikowane w: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 598-628, ISBN 978-3-319-70693-1 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-70694-8_21 TinyKeys: A New Approach to Efficient Multi-Party Computation Autorzy: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez Opublikowane w: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33, ISBN 978-3-319-96877-3 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-96878-0_1 Yes, There is an Oblivious RAM Lower Bound! Autorzy: Kasper Green Larsen, Jesper Buus Nielsen Opublikowane w: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 523-542, ISBN 978-3-319-96880-3 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-96881-0_18 Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification Autorzy: Peter Sebastian Nordholt, Meilof Veeningen Opublikowane w: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 321-339, ISBN 978-3-319-93386-3 Wydawca: Springer International Publishing DOI: 10.1007/978-3-319-93387-0_17 Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Autorzy: Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez Opublikowane w: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117, ISBN 978-3-030-03331-6 Wydawca: Springer International Publishing DOI: 10.1007/978-3-030-03332-3_4 Wyszukiwanie danych OpenAIRE... Podczas wyszukiwania danych OpenAIRE wystąpił błąd Brak wyników