ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1202.3052
  4. Cited By
A New Approach to Practical Active-Secure Two-Party Computation

A New Approach to Practical Active-Secure Two-Party Computation

14 February 2012
J. Nielsen
P. S. Nordholt
Claudio Orlandi
Sai Sheshank Burra
ArXiv (abs)PDFHTML

Papers citing "A New Approach to Practical Active-Secure Two-Party Computation"

23 / 23 papers shown
Title
Confidential Guardian: Cryptographically Prohibiting the Abuse of Model Abstention
Confidential Guardian: Cryptographically Prohibiting the Abuse of Model Abstention
Stephan Rabanser
Ali Shahin Shamsabadi
Olive Franzese
Xiao Wang
Adrian Weller
Nicolas Papernot
16
0
0
29 May 2025
OATH: Efficient and Flexible Zero-Knowledge Proofs of End-to-End ML
  Fairness
OATH: Efficient and Flexible Zero-Knowledge Proofs of End-to-End ML Fairness
Olive Franzese
Ali Shahin Shamsabadi
Hamed Haddadi
49
3
0
17 Sep 2024
ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion
  System for Inter-State Relationships
ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships
Thomas Reinhold
Philip D. . Kuehn
Daniel Gunther
T. Schneider
Christian A. Reuter
41
1
0
01 Jun 2023
A Formal Model for Secure Multiparty Computation
A Formal Model for Secure Multiparty Computation
Amy Rathore
Marina Blanton
Marco Gaboardi
Lukasz Ziarek
33
1
0
01 Jun 2023
Efficient Multiparty Protocols Using Generalized Parseval's Identity and
  the Theta Algebra
Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra
G. Sonnino
A. Sonnino
20
1
0
21 Aug 2022
Tabula: Efficiently Computing Nonlinear Activation Functions for Secure
  Neural Network Inference
Tabula: Efficiently Computing Nonlinear Activation Functions for Secure Neural Network Inference
Maximilian Lam
Michael Mitzenmacher
Vijay Janapa Reddi
Gu-Yeon Wei
David Brooks
90
3
0
05 Mar 2022
CECILIA: Comprehensive Secure Machine Learning Framework
CECILIA: Comprehensive Secure Machine Learning Framework
Ali Burak Ünal
Nícolas Pfeifer
Mete Akgün
69
3
0
07 Feb 2022
AOT: Anonymization by Oblivious Transfer
AOT: Anonymization by Oblivious Transfer
Farid Javani
Alan T. Sherman
39
1
0
22 May 2021
Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry
  Scale Deployment
Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment
Mahnush Movahedi
Benjamin M. Case
Andrew Knox
James Honaker
Li Li
Yiming Paul Li
Sanjay Saravanan
Shubho Sengupta
Erik Taubeneck
37
12
0
12 Jan 2021
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar
Sukrit Kalra
Avishay Yanai
Ryan Deng
Raluca A. Popa
J. M. Hellerstein
99
69
0
26 Oct 2020
MPC-enabled Privacy-Preserving Neural Network Training against Malicious
  Attack
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack
Ziyao Liu
Ivan Tjuawinata
C. Xing
K. Lam
76
9
0
24 Jul 2020
FMPC: Secure Multiparty Computation from Fourier Series and Parseval's
  Identity
FMPC: Secure Multiparty Computation from Fourier Series and Parseval's Identity
A. Sonnino
15
1
0
05 Dec 2019
Fast Actively Secure OT Extension for Short Secrets
Fast Actively Secure OT Extension for Short Secrets
A. Patra
Pratik Sarkar
Ajith Suresh
16
22
0
20 Nov 2019
Secure Multi-party Computation for Cloud-based Control
Secure Multi-party Computation for Cloud-based Control
A. Alexandru
George J. Pappas
49
27
0
23 Jun 2019
PD-ML-Lite: Private Distributed Machine Learning from Lighweight
  Cryptography
PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography
Maksim Tsikhanovich
M. Magdon-Ismail
M. Ishaq
Vassilis Zikas
76
4
0
23 Jan 2019
Sharing Information with Competitors
Sharing Information with Competitors
Simina Brânzei
Claudio Orlandi
Guang Yang
FedML
10
1
0
27 Sep 2018
SEMBA:SEcure multi-biometric authentication
SEMBA:SEcure multi-biometric authentication
G. Droandi
Mauro Barni
Riccardo Lazzeretti
Tommaso Pignata
19
33
0
28 Mar 2018
A Framework for Efficient Adaptively Secure Composable Oblivious
  Transfer in the ROM
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo L. Barreto
B. David
Rafael Dowsley
Kirill Morozov
Anderson C. A. Nascimento
47
28
0
23 Oct 2017
Decentralized Certificate Authorities
Decentralized Certificate Authorities
Bargav Jayaraman
Hannah Li
David Evans
18
10
0
11 Jun 2017
Curie: Policy-based Secure Data Exchange
Curie: Policy-based Secure Data Exchange
Z. Berkay Celik
Hidayet Aksu
Abbas Acar
Ryan Sheatsley
A. S. Uluagac
Patrick McDaniel
79
6
0
27 Feb 2017
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic
  Approach
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach
Qingjun Chen
Chen Qian
Sheng Zhong
24
16
0
22 May 2015
The Crypto-democracy and the Trustworthy
The Crypto-democracy and the Trustworthy
Sébastien Gambs
Samuel Ranellucci
Alain Tapp
FedML
44
1
0
08 Sep 2014
Lightweight Self-Bootstrapping Multiparty Computations of Time-Series
  Data with Custom Collusion Tolerance
Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance
Michael Clear
Constantinos Patsakis
Paul Laird
36
0
0
28 Feb 2014
1