On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
Mihaela IonBen KreuterAhmet Erhan NergizSarvar PatelMariana RaykovaShobhit SaxenaKarn SethDavid ShanahanMoti YungPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- business applications
- homomorphic encryption
- privacy preserving
- business processes
- data mining
- application developers
- database applications
- cryptographic protocols
- security protocols
- web services
- authentication protocol
- key exchange
- cross platform
- web applications
- multi party
- key agreement protocol
- secure multiparty computation
- key distribution
- security properties
- application level
- enterprise wide
- security services
- security mechanisms
- group communication
- expert systems
- semi honest
- data sharing
- software product
- business process