POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model
Abstract
References
Index Terms
- POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model
Recommendations
Two-Round MPC: Information-Theoretic and Black-Box
Theory of CryptographyAbstractWe continue the study of protocols for secure multiparty computation (MPC) that require only two rounds of interaction. The recent works of Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) essentially settle the ...
Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions
Theory of CryptographyAbstractWe present the first two-round multiparty computation (MPC) protocols secure against malicious adaptive corruption in the common reference string (CRS) model, based on DDH, LWE, or QR. Prior two-round adaptively secure protocols were known only in ...
Multi-Authority Attribute-Based Access Control with Smart Contract
ICBCT '19: Proceedings of the 2019 International Conference on Blockchain TechnologyAttribute-based access control makes access control decisions based on the assigned attributes of subjects and the access policies to protect objects by mediating operations from the subjects. Authority, which validates attributes of subjects, is one key ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Hung-Min Sun,
- Shiuhpyng Shieh,
- Program Chairs:
- Guofei Gu,
- Giuseppe Ateniese
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Funding Sources
- Ministry of Science and Technology
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 113Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in