2012
DOI: 10.1007/s10207-012-0177-2
|View full text |Cite
|
Sign up to set email alerts
|

High-performance secure multi-party computation for data mining applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
149
1
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 173 publications
(151 citation statements)
references
References 10 publications
0
149
1
1
Order By: Relevance
“…For more details on the security model of Sharemind, please refer to the PhD thesis [6]. Note that since then, the primitive protocols of Sharemind have been updated to be more efficient [8].…”
Section: The Sharemind Platformmentioning
confidence: 99%
See 3 more Smart Citations
“…For more details on the security model of Sharemind, please refer to the PhD thesis [6]. Note that since then, the primitive protocols of Sharemind have been updated to be more efficient [8].…”
Section: The Sharemind Platformmentioning
confidence: 99%
“…In case of a secret-shared representation; however, access to the bits is nontrivial and involves a lot of computation for bit extraction [7,8]. An alternative would be storing the values shared bitwise, but this would render the underlying processor arithmetic unusable, and we would need to reimplement all the basic arithmetic operations on these shares.…”
Section: Representation Of Floating Point Numbersmentioning
confidence: 99%
See 2 more Smart Citations
“…While the generic construction is expensive in computation and communication, the result has sparked research activities in secure multiparty computation (SMC), with results that are impressive both performance-wise [9,11,17,20], as well as in the variety of concrete problems that have been tackled [10,14,16,21]. From the start, two kinds of adversaries -passive and active -have been considered in the construction of SMC protocols, with highest performance and the greatest variety achieved for protocol sets secure only against passive adversaries.…”
Section: Introductionmentioning
confidence: 99%