Browsing by Subject "Elliptic Curve Cryptography"
Now showing items 1-2 of 2
-
GPU-based Parallel Computing Models and Implementations for Two-party Privacy-preserving Protocols (2013-11-25)In (two-party) privacy-preserving-based applications, two users use encrypted inputs to compute a function without giving out plaintext of their input values. Privacy-preserving computing algorithms have to utilize a large ...
-
(2012-07-16)The objective of this research is focused on two of the most important privacy-preserving techniques: privacy-preserving element matching protocols and privacy-preserving credential authentication protocols, where an element ...