2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.78
|View full text |Cite
|
Sign up to set email alerts
|

Towards Empirical Aspects of Secure Scalar Product

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…In addition, empirical studies and a real-world case study are conducted to evaluate this implementation framework [8], [9], [10]. However, to implement a new protocol using their framework, the user has to write Ruby code for each party and follows many detailed conventions, including the building block, data communication and additive sharing ones.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, empirical studies and a real-world case study are conducted to evaluate this implementation framework [8], [9], [10]. However, to implement a new protocol using their framework, the user has to write Ruby code for each party and follows many detailed conventions, including the building block, data communication and additive sharing ones.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Indeed, we have proposed an information theoretical framework to quantitatively measure the amount of privacy leakage in a protocol [7], and conducted empirical studies on such information theoretically secure protocols developed in a two-party setting [8], [9]. Besides, we have developed a distributed SMC framework for implementing secure protocols with the help of a commodity server in the Ruby language.…”
Section: Introductionmentioning
confidence: 99%
“…Alice (but not Bob) is to get the result of X · Y + r , where r is a random number known by Bob only. Various solutions have been proposed in the literature (Amirbekyan and Estivill-Castro 2007;Wang et al 2008;Yang et al 2006). Here, we propose another protocol based on the commodity server architecture.…”
Section: Secure Scalar Product Protocol (Sspp)mentioning
confidence: 99%
“…It has been shown that the commodity-based scalar product protocol is a very efficient approach compared to existing benchmarks [12]. The scalar product approach is based on the above scalar product protocol.…”
Section: Theorem 1 (Secure Two-party Product Protocol) π Is An Informmentioning
confidence: 99%