Zobrazeno 1 - 10
of 140
pro vyhledávání: '"Large-scale MPC"'
In this work we tackle privacy concerns in biometric verification systems that typically require server-side processing of sensitive data (e.g., fingerprints and Iris Codes). Concretely, we design a solution that allows us to query whether a given Ir
Externí odkaz:
http://arxiv.org/abs/2405.04463
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030778859
EUROCRYPT (2)
EUROCRYPT (2)
Secure multi-party computation (MPC) allows multiple parties to perform secure joint computations on their private inputs. Today, applications for MPC are growing with thousands of parties wishing to build federated machine learning models or trusted
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ded0d944f0608bd2e313f76ce71883e
https://doi.org/10.1007/978-3-030-77886-6_24
https://doi.org/10.1007/978-3-030-77886-6_24
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Advances in Cryptology – ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III
Lecture Notes in Computer Science ISBN: 9783030033316
ASIACRYPT (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2018
Hazay, C, Orsini, E, Scholl, P & Soria-Vazquez, E 2018, Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) . in T Peyrin & S Galbraith (eds), Advances in Cryptology – ASIACRYPT 2018 . vol. 11274, Springer VS, Lecture Notes in Computer Science (LNCS), no. 11274, pp. 86-117, Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 2018, Brisbane, Australia, 02/12/2018 . https://doi.org/10.1007/978-3-030-03332-3_4
Lecture Notes in Computer Science ISBN: 9783030033316
ASIACRYPT (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2018
Hazay, C, Orsini, E, Scholl, P & Soria-Vazquez, E 2018, Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) . in T Peyrin & S Galbraith (eds), Advances in Cryptology – ASIACRYPT 2018 . vol. 11274, Springer VS, Lecture Notes in Computer Science (LNCS), no. 11274, pp. 86-117, Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 2018, Brisbane, Australia, 02/12/2018 . https://doi.org/10.1007/978-3-030-03332-3_4
In this work we develop a new theory for concretely efficient, large-scale MPC with active security. Current practical techniques are mostly in the strong setting of all-but-one corruptions, which leads to protocols that scale badly with the number o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1da8fac2a35ab19350d6d6489a95f36f
https://zenodo.org/record/2594595
https://zenodo.org/record/2594595
Publikováno v:
SICE Journal of Control, Measurement, and System Integration. 7:152-158
This paper investigates model predictive control (MPC) of large-scale systems with both continuous-valued and discrete-valued control inputs. In the authors' previously proposed method, the no...
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
SICE Journal of Control, Measurement, and System Integration; May 2014, Vol. 7 Issue: 3 p152-158, 7p
Publikováno v:
Proceedings of the 1997 American Control Conference (Cat. No.97CH36041).
This paper presents an application of a customized linear programming (LP) based model predictive control strategy to the paper machine cross direction (CD) control problem. The objective of CD control is to maintain flat profiles of variables of int
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Gentry, C, Halevi, S, Magri, B, Nielsen, J B & Yakoubov, S 2021, Random-Index PIR and Applications . in K Nissim & B Waters (eds), Theory of Cryptography-19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III . vol. 13044, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13044 LNCS, Springer Berlin, pp. 32-61 . https://doi.org/10.1007/978-3-030-90456-2_2
Theory of Cryptography ISBN: 9783030904555
TCC (3)
Theory of Cryptography ISBN: 9783030904555
TCC (3)
Private information retrieval (PIR) lets a client retrieve an entry from a database without the server learning which entry was retrieved. Here we study a weaker variant that we call random-index PIR (RPIR), where the retrieved index is an output rat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c38c200613ed8d8689315d5f3b1d286a
https://eprint.iacr.org/2020/1248.pdf
https://eprint.iacr.org/2020/1248.pdf