Leveraging the "Multi" in secure multi-party computation
- 30 October 2003
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Privacy-preserving distributed mining of association rules on horizontally partitioned dataIEEE Transactions on Knowledge and Data Engineering, 2004
- A practical approach to solve Secure Multi-party Computation problemsPublished by Association for Computing Machinery (ACM) ,2002
- Privacy preserving association rule mining in vertically partitioned dataPublished by Association for Computing Machinery (ACM) ,2002
- Communication preserving protocols for secure function evaluationPublished by Association for Computing Machinery (ACM) ,2001
- Privacy preserving auctions and mechanism designPublished by Association for Computing Machinery (ACM) ,1999
- Commodity-based cryptography (extended abstract)Published by Association for Computing Machinery (ACM) ,1997
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- How to generate and exchange secretsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978