2015
DOI: 10.1017/cbo9781107337756
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multiparty Computation and Secret Sharing

Abstract: In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
404
0
10

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 466 publications
(415 citation statements)
references
References 125 publications
1
404
0
10
Order By: Relevance
“…Intuitively, the larger the filter, the lower the number of occurrences for high values of v i . This has strong implications on the privacy properties of the filter: if we consider a δ S resulting in 0 non-zero values, a person standing in that region will have (v 10 Table 3. Each plotted function represents the false positives probability for a specific area ∆ i .…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Intuitively, the larger the filter, the lower the number of occurrences for high values of v i . This has strong implications on the privacy properties of the filter: if we consider a δ S resulting in 0 non-zero values, a person standing in that region will have (v 10 Table 3. Each plotted function represents the false positives probability for a specific area ∆ i .…”
Section: Discussionmentioning
confidence: 99%
“…We assume the parties are honest-butcurious [10], that is, the parties will follow the protocol but try to learn additional information about other parties private data.…”
Section: Privacy Definitionsmentioning
confidence: 99%
“…The main advantage is that their input stays private. SMC algorithms today enable us to do secure addition, multiplication, and comparison [25,[42][43][44]. SMC algorithms are used in various fields of science.…”
Section: Privacy Concerns In Supply Chainmentioning
confidence: 99%
“…Requirement 1 is an extension to conditions of SMC on satisfying privacy [44]. In our case it is not allowed that more information than the final result (BC) is shared.…”
Section: Requirement 1 the Artifact Should Keep The Scn Topology As mentioning
confidence: 99%
“…The users should not learn any additional information about the data of others than what they may infer from their own data and the functions they are computing. Various applications such as online auctions, electronic voting, and privacy preserving data mining motivate the study of MPC [6,Chapter 1].…”
Section: Introductionmentioning
confidence: 99%