Author:
Hiwatashi Keitaro,Ohata Satsuya,Nuida Koji
Publisher
Springer International Publishing
Reference26 articles.
1. Aliasgari, M., Blanton, M., Zhang, Y., Steele, A.: Secure computation on floating point numbers. In: NDSS (2013)
2. Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 805–817. ACM (2016)
3. Barni, M., Guajardo, J., Lazzeretti, R.: Privacy preserving evaluation of signal quality with application to ecg analysis. In: 2010 IEEE International Workshop on Information Forensics and Security, pp. 1–6. IEEE (2010)
4. Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11(6), 403–418 (2012)
5. Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: Sepia: Security through private information aggregation. arXiv preprint (2009). arXiv:0903.4258
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2023
2. Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization;Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security;2022-05-30
3. Secure integer division with a private divisor;Proceedings on Privacy Enhancing Technologies;2021-07-23
4. Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension;Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security;2021-05-24
5. An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2021