Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security
• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the stan...
Ausführliche Beschreibung
Autor*in: |
Wu, Yulin [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022 |
---|
Übergeordnetes Werk: |
Enthalten in: The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds - Ling, Kunyue ELSEVIER, 2022, an international journal, Amsterdam |
---|---|
Übergeordnetes Werk: |
volume:80 ; year:2022 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.csi.2021.103570 |
---|
Katalog-ID: |
ELV055753884 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV055753884 | ||
003 | DE-627 | ||
005 | 20230624223532.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220105s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.csi.2021.103570 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica |
035 | |a (DE-627)ELV055753884 | ||
035 | |a (ELSEVIER)S0920-5489(21)00065-9 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 550 |q VZ |
084 | |a 38.32 |2 bkl | ||
100 | 1 | |a Wu, Yulin |e verfasserin |4 aut | |
245 | 1 | 0 | |a Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
264 | 1 | |c 2022 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. | ||
700 | 1 | |a Wang, Xuan |4 oth | |
700 | 1 | |a Susilo, Willy |4 oth | |
700 | 1 | |a Yang, Guomin |4 oth | |
700 | 1 | |a Jiang, Zoe L. |4 oth | |
700 | 1 | |a Li, Junyi |4 oth | |
700 | 1 | |a Liu, Xueqiao |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science Publ. BV (North-Holland) |a Ling, Kunyue ELSEVIER |t The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |d 2022 |d an international journal |g Amsterdam |w (DE-627)ELV00903689X |
773 | 1 | 8 | |g volume:80 |g year:2022 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.csi.2021.103570 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a SSG-OLC-PHA | ||
912 | |a SSG-OPC-GGO | ||
936 | b | k | |a 38.32 |j Geochemie |q VZ |
951 | |a AR | ||
952 | |d 80 |j 2022 |h 0 |
author_variant |
y w yw |
---|---|
matchkey_str |
wuyulinwangxuansusilowillyyangguominjian:2022----:iepooomliatcmuainrmwrtwrsopecmuain |
hierarchy_sort_str |
2022 |
bklnumber |
38.32 |
publishDate |
2022 |
allfields |
10.1016/j.csi.2021.103570 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica (DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 DE-627 ger DE-627 rakwb eng 550 VZ 38.32 bkl Wu, Yulin verfasserin aut Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security 2022 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. Wang, Xuan oth Susilo, Willy oth Yang, Guomin oth Jiang, Zoe L. oth Li, Junyi oth Liu, Xueqiao oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:80 year:2022 pages:0 https://doi.org/10.1016/j.csi.2021.103570 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 80 2022 0 |
spelling |
10.1016/j.csi.2021.103570 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica (DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 DE-627 ger DE-627 rakwb eng 550 VZ 38.32 bkl Wu, Yulin verfasserin aut Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security 2022 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. Wang, Xuan oth Susilo, Willy oth Yang, Guomin oth Jiang, Zoe L. oth Li, Junyi oth Liu, Xueqiao oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:80 year:2022 pages:0 https://doi.org/10.1016/j.csi.2021.103570 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 80 2022 0 |
allfields_unstemmed |
10.1016/j.csi.2021.103570 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica (DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 DE-627 ger DE-627 rakwb eng 550 VZ 38.32 bkl Wu, Yulin verfasserin aut Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security 2022 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. Wang, Xuan oth Susilo, Willy oth Yang, Guomin oth Jiang, Zoe L. oth Li, Junyi oth Liu, Xueqiao oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:80 year:2022 pages:0 https://doi.org/10.1016/j.csi.2021.103570 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 80 2022 0 |
allfieldsGer |
10.1016/j.csi.2021.103570 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica (DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 DE-627 ger DE-627 rakwb eng 550 VZ 38.32 bkl Wu, Yulin verfasserin aut Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security 2022 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. Wang, Xuan oth Susilo, Willy oth Yang, Guomin oth Jiang, Zoe L. oth Li, Junyi oth Liu, Xueqiao oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:80 year:2022 pages:0 https://doi.org/10.1016/j.csi.2021.103570 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 80 2022 0 |
allfieldsSound |
10.1016/j.csi.2021.103570 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica (DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 DE-627 ger DE-627 rakwb eng 550 VZ 38.32 bkl Wu, Yulin verfasserin aut Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security 2022 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. Wang, Xuan oth Susilo, Willy oth Yang, Guomin oth Jiang, Zoe L. oth Li, Junyi oth Liu, Xueqiao oth Enthalten in Elsevier Science Publ. BV (North-Holland) Ling, Kunyue ELSEVIER The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds 2022 an international journal Amsterdam (DE-627)ELV00903689X volume:80 year:2022 pages:0 https://doi.org/10.1016/j.csi.2021.103570 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO 38.32 Geochemie VZ AR 80 2022 0 |
language |
English |
source |
Enthalten in The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds Amsterdam volume:80 year:2022 pages:0 |
sourceStr |
Enthalten in The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds Amsterdam volume:80 year:2022 pages:0 |
format_phy_str_mv |
Article |
bklname |
Geochemie |
institution |
findex.gbv.de |
dewey-raw |
550 |
isfreeaccess_bool |
false |
container_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
authorswithroles_txt_mv |
Wu, Yulin @@aut@@ Wang, Xuan @@oth@@ Susilo, Willy @@oth@@ Yang, Guomin @@oth@@ Jiang, Zoe L. @@oth@@ Li, Junyi @@oth@@ Liu, Xueqiao @@oth@@ |
publishDateDaySort_date |
2022-01-01T00:00:00Z |
hierarchy_top_id |
ELV00903689X |
dewey-sort |
3550 |
id |
ELV055753884 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV055753884</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230624223532.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220105s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.csi.2021.103570</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV055753884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0920-5489(21)00065-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">38.32</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Yulin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Xuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susilo, Willy</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Guomin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Zoe L.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Junyi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Xueqiao</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science Publ. BV (North-Holland)</subfield><subfield code="a">Ling, Kunyue ELSEVIER</subfield><subfield code="t">The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds</subfield><subfield code="d">2022</subfield><subfield code="d">an international journal</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV00903689X</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:80</subfield><subfield code="g">year:2022</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.csi.2021.103570</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-GGO</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">38.32</subfield><subfield code="j">Geochemie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">80</subfield><subfield code="j">2022</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Wu, Yulin |
spellingShingle |
Wu, Yulin ddc 550 bkl 38.32 Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
authorStr |
Wu, Yulin |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV00903689X |
format |
electronic Article |
dewey-ones |
550 - Earth sciences |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
550 VZ 38.32 bkl Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
topic |
ddc 550 bkl 38.32 |
topic_unstemmed |
ddc 550 bkl 38.32 |
topic_browse |
ddc 550 bkl 38.32 |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
x w xw w s ws g y gy z l j zl zlj j l jl x l xl |
hierarchy_parent_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
hierarchy_parent_id |
ELV00903689X |
dewey-tens |
550 - Earth sciences & geology |
hierarchy_top_title |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV00903689X |
title |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
ctrlnum |
(DE-627)ELV055753884 (ELSEVIER)S0920-5489(21)00065-9 |
title_full |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
author_sort |
Wu, Yulin |
journal |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
journalStr |
The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
500 - Science |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Wu, Yulin |
container_volume |
80 |
class |
550 VZ 38.32 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Wu, Yulin |
doi_str_mv |
10.1016/j.csi.2021.103570 |
dewey-full |
550 |
title_sort |
mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
title_auth |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
abstract |
• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. |
abstractGer |
• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. |
abstract_unstemmed |
• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA SSG-OPC-GGO |
title_short |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security |
url |
https://doi.org/10.1016/j.csi.2021.103570 |
remote_bool |
true |
author2 |
Wang, Xuan Susilo, Willy Yang, Guomin Jiang, Zoe L. Li, Junyi Liu, Xueqiao |
author2Str |
Wang, Xuan Susilo, Willy Yang, Guomin Jiang, Zoe L. Li, Junyi Liu, Xueqiao |
ppnlink |
ELV00903689X |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth oth oth |
doi_str |
10.1016/j.csi.2021.103570 |
up_date |
2024-07-06T18:26:15.132Z |
_version_ |
1803855200395460608 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV055753884</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230624223532.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220105s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.csi.2021.103570</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001569.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV055753884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0920-5489(21)00065-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">550</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">38.32</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wu, Yulin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">• Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model. • Construct the maliciously secure mixed-protocol MPC framework, which is the first maliciously secure mixed-protocol MPC framework relying on the standard model. • Provide a higher security guarantee than all the previous mixed-protocol MPC frameworks in the literature. • Provide theoretical analysis of computation and communication costs for the six types of share conversion protocols as an important reference for future developers.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Xuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susilo, Willy</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yang, Guomin</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jiang, Zoe L.</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Junyi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Xueqiao</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science Publ. BV (North-Holland)</subfield><subfield code="a">Ling, Kunyue ELSEVIER</subfield><subfield code="t">The Emeishan large igneous province eruption triggered coastal perturbations and the Capitanian mass extinction: Insights from mercury in Permian bauxite beds</subfield><subfield code="d">2022</subfield><subfield code="d">an international journal</subfield><subfield code="g">Amsterdam</subfield><subfield code="w">(DE-627)ELV00903689X</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:80</subfield><subfield code="g">year:2022</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.csi.2021.103570</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-GGO</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">38.32</subfield><subfield code="j">Geochemie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">80</subfield><subfield code="j">2022</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.401392 |