搜索结果: 1-8 共查到“军队指挥学 sorting”相关记录8条 . 查询时间(0.109 秒)
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
sorting secret sharing three-party computation
2019/6/13
We present a novel three-party sorting protocol secure against passive adversaries in the honest majority setting. The protocol can be easily combined with other secure protocols which work on shared ...
Can We Overcome the nlogn Barrier for Oblivious Sorting?
complexity theory foundations oblivious algorithms
2018/3/5
It is well-known that non-comparison-based techniques can allow us to sort nn elements in o(nlogn)o(nlogn) time on a Random-Access Machine (RAM). On the other hand, it is a long-standing open q...
Cache-Oblivious and Data-Oblivious Sorting and Applications
cache oblivious algorithms data oblivious algorithms ORAM
2017/9/25
Although external-memory sorting has been a classical algorithms abstraction and has been heavily studied in the literature, perhaps somewhat surprisingly, when data-obliviousness is a requirement, ev...
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation
secure multi-party computation MPC sorting algorithm
2016/1/25
We propose a simple and efficient sorting algorithm for secure multiparty
computation (MPC). The algorithm is designed to be efficient when the
number of parties and the size of the underlying field...
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
cryptographic protocols encrypted data
2016/1/5
We study the problem of private outsourced sorting of encrypted data. We start by proposing a novel sorting protocol that allows a user to outsource his data to a cloud server in an encrypted form and...
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud
Fully Homomorphic Encrypted Data Cloud
2015/12/22
The challenge of maintaining confidentiality of stored data in cloud is of utmost importance to realize the potential of cloud computing. Storing data in encrypted form may solve the problem, but incr...
Updates on Sorting of Fully Homomorphic Encrypted Data
Fully Homomorphic Encryption Cloud Computing Sorting
2015/12/22
In this paper, we show implementation results of various algorithms that sort data encrypted with Fully Ho- momorphic Encryption scheme based on Integers. We analyze the complexities of sorting algori...
Secure Multi-Party Sorting and Applications
cryptographic protocols / Secure multi-party computation Sorting Aggregation Cooperative anomaly detection
2012/3/29
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing a secure multi-part...