USING JIFF FOR COLLABORATIVE MEDICAL DATA ANALYSIS WITH SECURE MULTIPARTY COMPUTATION
In collaborative data analysis, secure multiparty computation can be utilised to compute statistical functions in a private manner. For the purpose of developing apps that require safe multi-party collaboration, JIFF is an open-source JavaScript library. We use JIFF to create an application that all...
| Published in: | Proceedings on Engineering Sciences |
|---|---|
| Main Authors: | Usha Divakarla, K Chandrasekaran, K Hemanth Kumar Reddy |
| Format: | Article |
| Language: | English |
| Published: |
University of Kragujevac
2025-03-01
|
| Subjects: | |
| Online Access: | https://pesjournal.net/journal/v7-n1/68.pdf |
Similar Items
Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation
by: Khalid Mrabet, et al.
Published: (2023-02-01)
by: Khalid Mrabet, et al.
Published: (2023-02-01)
Sequre: a high-performance framework for secure multiparty computation enables biomedical data sharing
by: Haris Smajlović, et al.
Published: (2023-01-01)
by: Haris Smajlović, et al.
Published: (2023-01-01)
Power Differences and Dynamics in Multiparty Collaborative Systems: A Systematic Literature Review
by: Sabina Ramona Trif, et al.
Published: (2022-03-01)
by: Sabina Ramona Trif, et al.
Published: (2022-03-01)
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
by: Mariano Lemus, et al.
Published: (2020-06-01)
by: Mariano Lemus, et al.
Published: (2020-06-01)
Multiparty Delegated Quantum Computing
by: Elham Kashefi, et al.
Published: (2017-07-01)
by: Elham Kashefi, et al.
Published: (2017-07-01)
Foundations of Programmable Secure Computation
by: Sven Laur, et al.
Published: (2021-08-01)
by: Sven Laur, et al.
Published: (2021-08-01)
Privacy-preserving recommendation system based on social relationships
by: Simin Yu, et al.
Published: (2024-02-01)
by: Simin Yu, et al.
Published: (2024-02-01)
Fast and Private 1-to-<inline-formula><tex-math notation="LaTeX">$N$</tex-math></inline-formula> Face Identification Protocols
by: Nuttapong Attrapadung, et al.
Published: (2025-01-01)
by: Nuttapong Attrapadung, et al.
Published: (2025-01-01)
Editorial: Multiparty secure quantum and semiquantum computations
by: Tianyu Ye
Published: (2023-02-01)
by: Tianyu Ye
Published: (2023-02-01)
A Reliable Aggregation Method Based on Threshold Additive Secret Sharing in Federated Learning with Quality of Service (QoS) Support
by: Yu-Ting Ting, et al.
Published: (2024-10-01)
by: Yu-Ting Ting, et al.
Published: (2024-10-01)
Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain
by: Haijun Bao, et al.
Published: (2024-07-01)
by: Haijun Bao, et al.
Published: (2024-07-01)
TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server
by: Keiichi Iwamura, et al.
Published: (2022-01-01)
by: Keiichi Iwamura, et al.
Published: (2022-01-01)
Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols
by: Mohammad Anagreh, et al.
Published: (2024-12-01)
by: Mohammad Anagreh, et al.
Published: (2024-12-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem
by: Bo Mi, et al.
Published: (2025-06-01)
by: Bo Mi, et al.
Published: (2025-06-01)
Secure Multiparty Computation of Set Intersection and Union
by: XIE Qiong, WANG Weiqiong, XU Haojie
Published: (2024-02-01)
by: XIE Qiong, WANG Weiqiong, XU Haojie
Published: (2024-02-01)
Privacy-preserving machine learning based on secure four-party computations
by: Sergey V. Zapechnikov
Published: (2022-06-01)
by: Sergey V. Zapechnikov
Published: (2022-06-01)
Two new color (n, n)-secret sharing schemes
by: YI Feng, et al.
Published: (2007-01-01)
by: YI Feng, et al.
Published: (2007-01-01)
Two new color (n, n)-secret sharing schemes
by: YI Feng, et al.
Published: (2007-01-01)
by: YI Feng, et al.
Published: (2007-01-01)
Generalized Secure and Dynamic Decentralized Reputation System With a Dishonest Majority
by: Khalid Mrabet, et al.
Published: (2023-01-01)
by: Khalid Mrabet, et al.
Published: (2023-01-01)
On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection
by: Jiale Cheng, et al.
Published: (2023-04-01)
by: Jiale Cheng, et al.
Published: (2023-04-01)
A note on secure multiparty computation via higher residue symbols
by: Cascudo Ignacio, et al.
Published: (2021-01-01)
by: Cascudo Ignacio, et al.
Published: (2021-01-01)
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
by: Yun Luo, et al.
Published: (2024-01-01)
by: Yun Luo, et al.
Published: (2024-01-01)
Dynamic Multiparty Quantum Secret Sharing With a Trusted Party Based on Generalized GHZ State
by: Ri-Gui Zhou, et al.
Published: (2021-01-01)
by: Ri-Gui Zhou, et al.
Published: (2021-01-01)
Security Solutions for Privacy Preserving Improved Data Mining
by: Marian STOICA, et al.
Published: (2013-01-01)
by: Marian STOICA, et al.
Published: (2013-01-01)
Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption
by: Meenatchi Sundaram Muthu Selva Annamalai, et al.
Published: (2022-11-01)
by: Meenatchi Sundaram Muthu Selva Annamalai, et al.
Published: (2022-11-01)
Privacy-preserving machine learning based on secure three-party computations
by: Sergey V. Zapechnikov
Published: (2022-03-01)
by: Sergey V. Zapechnikov
Published: (2022-03-01)
Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums
by: Julio Fenner, et al.
Published: (2024-06-01)
by: Julio Fenner, et al.
Published: (2024-06-01)
POLITICAL PLURALISM AND MULTIPARTY
by: Erhard NICULESCU
Published: (2014-05-01)
by: Erhard NICULESCU
Published: (2014-05-01)
Review of privacy computing techniques for multi-party data fusion analysis
by: LIU Shenglong, et al.
Published: (2024-12-01)
by: LIU Shenglong, et al.
Published: (2024-12-01)
Multiparty, relation with patology of pregnancy and delivery
by: L. Andrejevic, et al.
Published: (2020-02-01)
by: L. Andrejevic, et al.
Published: (2020-02-01)
A Practical Multiparty Private Set Intersection Protocol Based on Bloom Filters for Unbalanced Scenarios
by: Ou Ruan, et al.
Published: (2023-12-01)
by: Ou Ruan, et al.
Published: (2023-12-01)
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation
by: Berry Schoenmakers, et al.
Published: (2023-11-01)
by: Berry Schoenmakers, et al.
Published: (2023-11-01)
A Secure Median Implementation for the Federated Secure Computing Architecture
by: Christian Goelz, et al.
Published: (2024-09-01)
by: Christian Goelz, et al.
Published: (2024-09-01)
EasySMPC: a simple but powerful no-code tool for practical secure multiparty computation
by: Felix Nikolaus Wirth, et al.
Published: (2022-12-01)
by: Felix Nikolaus Wirth, et al.
Published: (2022-12-01)
Private Product Computation Using Quantum Entanglement
by: Rene Bodker Christensen, et al.
Published: (2023-01-01)
by: Rene Bodker Christensen, et al.
Published: (2023-01-01)
Federated Secure Computing
by: Hendrik Ballhausen, et al.
Published: (2023-10-01)
by: Hendrik Ballhausen, et al.
Published: (2023-10-01)
Similar Items
-
Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation
by: Khalid Mrabet, et al.
Published: (2023-02-01) -
Sequre: a high-performance framework for secure multiparty computation enables biomedical data sharing
by: Haris Smajlović, et al.
Published: (2023-01-01) -
Power Differences and Dynamics in Multiparty Collaborative Systems: A Systematic Literature Review
by: Sabina Ramona Trif, et al.
Published: (2022-03-01) -
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01) -
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
