DOI: 10.54337/aau466211893
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in Optimization Algorithms based on Secure Multiparty Computation

Abstract: General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights.-Users may download and print one copy of any publication from the public portal for the purpose of private study or research. -You may not further distribute the material or use it for any profit-making activity or commerci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Secure Multi‐Party Computation (SMPC) originated from Yao's Millionaires’ problem [15] by Andrew Yao in 1982, and it is a method based on the absence of a trusted third party. There are many kinds of SMPC, including SSS, Additive/Multiplicative Sharing Scheme [16] etc. In this paper, we will focus on SSS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure Multi‐Party Computation (SMPC) originated from Yao's Millionaires’ problem [15] by Andrew Yao in 1982, and it is a method based on the absence of a trusted third party. There are many kinds of SMPC, including SSS, Additive/Multiplicative Sharing Scheme [16] etc. In this paper, we will focus on SSS.…”
Section: Related Workmentioning
confidence: 99%
“…FIGURE16 The architecture of image enhancement with Shamir's Secret Sharing and Berlekamp-Welch algorithm.…”
mentioning
confidence: 99%