Overview of Secure Comparison
Type de document :
Autre communication scientifique (congrès sans actes - poster - séminaire...)
Titre :
Overview of Secure Comparison
Auteur(s) :
Sinh, Quentin [Auteur]
Machine Learning in Information Networks [MAGNET]
Ramon, Jan [Auteur]
Machine Learning in Information Networks [MAGNET]
Machine Learning in Information Networks [MAGNET]
Ramon, Jan [Auteur]
Machine Learning in Information Networks [MAGNET]
Date de publication :
2024-06-14
Mot(s)-clé(s) en anglais :
Secure Comparison
Secret Sharing
Homomorphic Encryption
Function Secret Sharing
Secret Sharing
Homomorphic Encryption
Function Secret Sharing
Discipline(s) HAL :
Informatique [cs]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Résumé en anglais : [en]
Introduced by Yao's Millionaires' problem, Secure Comparison (SC) allows parties to compare two secrets in a privacy-preserving manner. This article gives an overview of the different SC techniques in various settings such ...
Lire la suite >Introduced by Yao's Millionaires' problem, Secure Comparison (SC) allows parties to compare two secrets in a privacy-preserving manner. This article gives an overview of the different SC techniques in various settings such as Secret Sharing (SS) or Homomorphic Encryption (HE).Lire moins >
Lire la suite >Introduced by Yao's Millionaires' problem, Secure Comparison (SC) allows parties to compare two secrets in a privacy-preserving manner. This article gives an overview of the different SC techniques in various settings such as Secret Sharing (SS) or Homomorphic Encryption (HE).Lire moins >
Langue :
Anglais
Vulgarisation :
Non
Projet Européen :
Collections :
Source :
Fichiers
- document
- Accès libre
- Accéder au document
- IEEE_Conference_Template-5.pdf
- Accès libre
- Accéder au document