Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1202.3052
Cited By
A New Approach to Practical Active-Secure Two-Party Computation
14 February 2012
J. Nielsen
P. S. Nordholt
Claudio Orlandi
Sai Sheshank Burra
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"A New Approach to Practical Active-Secure Two-Party Computation"
23 / 23 papers shown
Title
Confidential Guardian: Cryptographically Prohibiting the Abuse of Model Abstention
Stephan Rabanser
Ali Shahin Shamsabadi
Olive Franzese
Xiao Wang
Adrian Weller
Nicolas Papernot
16
0
0
29 May 2025
OATH: Efficient and Flexible Zero-Knowledge Proofs of End-to-End ML Fairness
Olive Franzese
Ali Shahin Shamsabadi
Hamed Haddadi
54
3
0
17 Sep 2024
ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships
Thomas Reinhold
Philip D. . Kuehn
Daniel Gunther
T. Schneider
Christian A. Reuter
41
1
0
01 Jun 2023
A Formal Model for Secure Multiparty Computation
Amy Rathore
Marina Blanton
Marco Gaboardi
Lukasz Ziarek
33
1
0
01 Jun 2023
Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra
G. Sonnino
A. Sonnino
22
1
0
21 Aug 2022
Tabula: Efficiently Computing Nonlinear Activation Functions for Secure Neural Network Inference
Maximilian Lam
Michael Mitzenmacher
Vijay Janapa Reddi
Gu-Yeon Wei
David Brooks
90
3
0
05 Mar 2022
CECILIA: Comprehensive Secure Machine Learning Framework
Ali Burak Ünal
Nícolas Pfeifer
Mete Akgün
73
3
0
07 Feb 2022
AOT: Anonymization by Oblivious Transfer
Farid Javani
Alan T. Sherman
39
1
0
22 May 2021
Privacy-Preserving Randomized Controlled Trials: A Protocol for Industry Scale Deployment
Mahnush Movahedi
Benjamin M. Case
Andrew Knox
James Honaker
Li Li
Yiming Paul Li
Sanjay Saravanan
Shubho Sengupta
Erik Taubeneck
37
12
0
12 Jan 2021
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar
Sukrit Kalra
Avishay Yanai
Ryan Deng
Raluca A. Popa
J. M. Hellerstein
99
69
0
26 Oct 2020
MPC-enabled Privacy-Preserving Neural Network Training against Malicious Attack
Ziyao Liu
Ivan Tjuawinata
C. Xing
K. Lam
76
9
0
24 Jul 2020
FMPC: Secure Multiparty Computation from Fourier Series and Parseval's Identity
A. Sonnino
17
1
0
05 Dec 2019
Fast Actively Secure OT Extension for Short Secrets
A. Patra
Pratik Sarkar
Ajith Suresh
18
22
0
20 Nov 2019
Secure Multi-party Computation for Cloud-based Control
A. Alexandru
George J. Pappas
51
27
0
23 Jun 2019
PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography
Maksim Tsikhanovich
M. Magdon-Ismail
M. Ishaq
Vassilis Zikas
82
4
0
23 Jan 2019
Sharing Information with Competitors
Simina Brânzei
Claudio Orlandi
Guang Yang
FedML
12
1
0
27 Sep 2018
SEMBA:SEcure multi-biometric authentication
G. Droandi
Mauro Barni
Riccardo Lazzeretti
Tommaso Pignata
21
33
0
28 Mar 2018
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Paulo L. Barreto
B. David
Rafael Dowsley
Kirill Morozov
Anderson C. A. Nascimento
49
28
0
23 Oct 2017
Decentralized Certificate Authorities
Bargav Jayaraman
Hannah Li
David Evans
20
10
0
11 Jun 2017
Curie: Policy-based Secure Data Exchange
Z. Berkay Celik
Hidayet Aksu
Abbas Acar
Ryan Sheatsley
A. S. Uluagac
Patrick McDaniel
79
6
0
27 Feb 2017
Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach
Qingjun Chen
Chen Qian
Sheng Zhong
26
16
0
22 May 2015
The Crypto-democracy and the Trustworthy
Sébastien Gambs
Samuel Ranellucci
Alain Tapp
FedML
46
1
0
08 Sep 2014
Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance
Michael Clear
Constantinos Patsakis
Paul Laird
38
0
0
28 Feb 2014
1