搜索结果: 1-4 共查到“军事学 secure computing”相关记录4条 . 查询时间(0.048 秒)
From Usability to Secure Computing and Back Again
secure multi-party computation (MPC) usability real-world deployment
2019/6/24
Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function while preserving the privacy of any individual party's inputs to that function. As MPC protocol...
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications
secure computation private intersection-sum secure aggregate ad conversion
2019/6/19
In this work, we describe how to deploy a cryptographic secure computation protocol for routine use in industry. Based on our experience, we identify major preliminaries and enabling factors which we ...
Efficient coding for secure computing with additively-homomorphic encrypted data
packing batching homomorphic encryption
2019/5/5
A framework is introduced for efficiently computing with encrypted data. We assume a semi-honest security model with two computing parties. Two different coding techniques are used with additively hom...
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing
secret key agreement single shot bound secure computing
2016/1/26
We consider secret key agreement by multiple parties observing
correlated data and communicating interactively over an insecure
communication channel. Our main contribution is a single-shot upper
b...