Protocols for secure computations

@article{Yao1982ProtocolsFS,
  title={Protocols for secure computations},
  author={A. Yao},
  journal={23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)},
  year={1982},
  pages={160-164}
}
  • A. Yao
  • Published 1982
  • Computer Science
  • 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
The author investigates the following problem: Suppose m people wish to compute the value of a function f(x1, x2, x3, ..., xm), which is an integer-valued function of m integer variables xi of bounded range. Assume initially person Pi knows the value of xi and no other x's. Is it possible for them to compute the value of f, by communicating among themselves, without unduly giving away any information about the values of their own variables? The author gives a precise formulation of this general… Expand
Quantum Privacy-Preserving Price E-Negotiation
  • Wenjie Liu, Chun-Tang Li, Yu Zheng, Yong Xu, Yinsong Xu
  • Computer Science
  • 2019
Lower bounds and optimal protocols for three-party secure computation
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing
Encrypted Model Predictive Control in the Cloud
Oblivious Parallel RAM and Applications
...
1
2
...

References

SHOWING 1-10 OF 12 REFERENCES
Some complexity questions related to distributive computing(Preliminary Report)
  • A. Yao
  • Computer Science, Mathematics
  • STOC
  • 1979
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
A method for obtaining digital signatures and public-key cryptosystems
Probabilistic encryption & how to play mental poker keeping secret all partial information
New directions in cryptography
14th ACM Symp. on Theory of Computing
  • 14th ACM Symp. on Theory of Computing
  • 1982
Three applications of the oblivious transfer
  • 1981, to appear.
  • 1981
Three applications of the oblivious transfer: Part I: Coin flipping by telephone; part II: How to exchange secrets; part III: How to send certified electronic mail
  • Technical report,
  • 1981
Mental poker
  • Technical Report LCS/TR-125,
  • 1979
Hellman , " New directions in cryptography , " IEEE Trans . on Inform
  • Theory IT -
  • 1976
...
1
2
...