1 resultado para Covert Sensitization
em DRUM (Digital Repository at the University of Maryland)
Filtro por publicador
- Adam Mickiewicz University Repository (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (11)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (1)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (14)
- Archive of European Integration (1)
- Aston University Research Archive (15)
- Biblioteca de Teses e Dissertações da USP (3)
- Biblioteca Digital | Sistema Integrado de Documentación | UNCuyo - UNCUYO. UNIVERSIDAD NACIONAL DE CUYO. (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (28)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (76)
- Biblioteca Virtual del Sistema Sanitario Público de Andalucía (BV-SSPA), Junta de Andalucía. Consejería de Salud y Bienestar Social, Spain (14)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (68)
- Brock University, Canada (1)
- Brunel University (1)
- Bucknell University Digital Commons - Pensilvania - USA (2)
- CamPuce - an association for the promotion of science and humanities in African Countries (1)
- CentAUR: Central Archive University of Reading - UK (24)
- Central European University - Research Support Scheme (1)
- Cochin University of Science & Technology (CUSAT), India (1)
- Consorci de Serveis Universitaris de Catalunya (CSUC), Spain (14)
- Cor-Ciencia - Acuerdo de Bibliotecas Universitarias de Córdoba (ABUC), Argentina (2)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Dalarna University College Electronic Archive (1)
- Digital Commons at Florida International University (8)
- Digital Peer Publishing (2)
- DigitalCommons - The University of Maine Research (1)
- DigitalCommons@The Texas Medical Center (41)
- Diposit Digital de la UB - Universidade de Barcelona (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (7)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (1)
- Fachlicher Dokumentenserver Paedagogik/Erziehungswissenschaften (1)
- Instituto Gulbenkian de Ciência (1)
- Instituto Politécnico de Santarém (1)
- Instituto Politécnico do Porto, Portugal (8)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (1)
- Martin Luther Universitat Halle Wittenberg, Germany (1)
- National Center for Biotechnology Information - NCBI (24)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (3)
- Portal do Conhecimento - Ministerio do Ensino Superior Ciencia e Inovacao, Cape Verde (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (1)
- Repositório Aberto da Universidade Aberta de Portugal (1)
- Repositorio Académico de la Universidad Nacional de Costa Rica (1)
- Repositorio Academico Digital UANL (1)
- Repositório Científico da Universidade de Évora - Portugal (6)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (5)
- Repositório Científico do Instituto Politécnico de Santarém - Portugal (1)
- Repositório da Escola Nacional de Administração Pública (ENAP) (1)
- Repositório da Produção Científica e Intelectual da Unicamp (3)
- Repositório da Universidade Federal do Espírito Santo (UFES), Brazil (1)
- Repositório do Centro Hospitalar de Lisboa Central, EPE - Centro Hospitalar de Lisboa Central, EPE, Portugal (6)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositório Institucional da Universidade Estadual de São Paulo - UNESP (1)
- Repositório Institucional da Universidade Federal do Rio Grande - FURG (1)
- Repositório Institucional da Universidade Federal do Rio Grande do Norte (1)
- Repositorio Institucional de la Universidad de Málaga (2)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (82)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- Scielo Saúde Pública - SP (35)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (4)
- Universidad Politécnica de Madrid (13)
- Universidade de Lisboa - Repositório Aberto (1)
- Universidade do Minho (2)
- Universidade dos Açores - Portugal (1)
- Universidade Federal de Uberlândia (1)
- Universidade Federal do Pará (2)
- Universidade Federal do Rio Grande do Norte (UFRN) (9)
- Universidade Técnica de Lisboa (1)
- Universita di Parma (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (1)
- Université de Lausanne, Switzerland (59)
- Université de Montréal, Canada (16)
- University of Connecticut - USA (1)
- University of Michigan (13)
- University of Queensland eSpace - Australia (17)
- University of Washington (2)
- WestminsterResearch - UK (1)
Resumo:
Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its potential for maintaining privacy guarantees in real-world applications. However, current secure computation protocols are not yet efficient enough to be used in practice. We argue that this is due to much of the research effort being focused on generality rather than specificity. Namely, current research tends to focus on constructing and improving protocols for the strongest notions of security or for an arbitrary number of parties. However, in real-world deployments, these security notions are often too strong, or the number of parties running a protocol would be smaller. In this thesis we make several steps towards bridging the efficiency gap of secure computation by focusing on constructing efficient protocols for specific real-world settings and security models. In particular, we make the following four contributions: - We show an efficient (when amortized over multiple runs) maliciously secure two-party secure computation (2PC) protocol in the multiple-execution setting, where the same function is computed multiple times by the same pair of parties. - We improve the efficiency of 2PC protocols in the publicly verifiable covert security model, where a party can cheat with some probability but if it gets caught then the honest party obtains a certificate proving that the given party cheated. - We show how to optimize existing 2PC protocols when the function to be computed includes predicate checks on its inputs. - We demonstrate an efficient maliciously secure protocol in the three-party setting.