Enigma: Decentralized Computation Platform with Guaranteed Privacy.

作者: Alex Pentland , Guy Zyskind , Oz Nathan

DOI:

关键词:

摘要: … The key new utility Enigma brings to the table is the ability to run computations on data, without having access to the … salary, and together compute the average wage of the group. Each …

参考文章(15)
Carsten Baum, Ivan Damgård, Claudio Orlandi, Publicly Auditable Secure Multi-Party Computation international conference on security and cryptography. pp. 175- 196 ,(2014) , 10.1007/978-3-319-10879-7_11
Iddo Bentov, Ranjit Kumaresan, How to Use Bitcoin to Design Fair Protocols Advances in Cryptology – CRYPTO 2014. ,vol. 2014, pp. 421- 439 ,(2014) , 10.1007/978-3-662-44381-1_24
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Montesquieu., Anne M. Cohler, Harold Samuel Stone, Basia Carolyn Miller, The spirit of the laws New York: D. Appleton and Company. ,(1949)
Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart, Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits european symposium on research in computer security. pp. 1- 18 ,(2013) , 10.1007/978-3-642-40203-6_1
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten, SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies 2015 IEEE Symposium on Security and Privacy. pp. 104- 121 ,(2015) , 10.1109/SP.2015.14
Assaf Ben-David, Noam Nisan, Benny Pinkas, FairplayMP Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 257- 266 ,(2008) , 10.1145/1455770.1455804
Michael Ben-Or, Shafi Goldwasser, Avi Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation symposium on the theory of computing. pp. 1- 10 ,(1988) , 10.1145/62212.62213