搜索结果: 1-4 共查到“军队指挥学 Private computation”相关记录4条 . 查询时间(0.125 秒)
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
Zexe: Enabling Decentralized Private Computation
decentralized computation zero knowledge proofs succinct arguments
2018/11/6
Ledger-based systems that enable rich applications often suffer from two limitations. First, validating a transaction requires re-executing the state transition that it attests to. Second, transaction...
A number of databases around the world currently host a wealth of genomic data
that is invaluable to researchers conducting a variety of genomic studies. However,
patients who volunteer their genomi...
The use of sensitive electronic information has increased tremendously in recent years. In many realistic application scenarios, legitimate needs for sensitive information must be reconciled with priv...