Contact Tracing (1) GMW (1) MPC (1) ORAM (1) Oblivious Computation (1) Parallel Computation (1) SGX (1) Two-party computation (1) Yao Garbled Circuits (1) Yao's Garbled Circuits (1) blockchain (1) consensus (2) contact tracing (1) file injection attack (1) multiparty computation (1) nakamoto (1) oblivious computation (4) privacy (1) proof of work (1) searchable encryption (2) trusted hardware (2) zero-knowledge (1) zero-knowledge-proofs (1) zk (1) zk-proofs (1)

 Contact Tracing (1)

Contact Tracing, TraceTogether + Apple-Google APIs, Hamagen

 GMW (1)

GMW and Yao's Garbled Circuits

 MPC (1)

Zero-Knowledge Proofs

 ORAM (1)

Secure Two-party Computation in Sublinear Time

 Oblivious Computation (1)

GMW and Yao's Garbled Circuits

 Parallel Computation (1)

Efficient Privacy-Preserving Parallel Computation

 SGX (1)

Trusted Hardware

 Two-party computation (1)

Secure Two-party Computation in Sublinear Time

 Yao Garbled Circuits (1)

Secure Two-party Computation in Sublinear Time

 Yao's Garbled Circuits (1)

GMW and Yao's Garbled Circuits

 blockchain (1)

Nakamoto Consensus and Bitcoin

 consensus (2)

Dolev-Strong protocol and FLM lower bound
Nakamoto Consensus and Bitcoin

 contact tracing (1)

Contact Tracing Approaches

 file injection attack (1)

File-Injection Attacks

 multiparty computation (1)

The ABY Protocol

 nakamoto (1)

Nakamoto Consensus and Bitcoin

 oblivious computation (4)

Secure multi-party computation and oblivious transfer
Oblivious Parallel RAM
Oblivious Sort and Oblivious Data Structures
Introduction to Oblivious RAM

 privacy (1)

Zero-Knowledge Proofs

 proof of work (1)

Nakamoto Consensus and Bitcoin

 searchable encryption (2)

File-Injection Attacks
Dynamic Searchable Symmetric Encryption

 trusted hardware (2)

Private Contact Discovery
Trusted Hardware

 zero-knowledge (1)

Zero-Knowledge Proofs

 zero-knowledge-proofs (1)

Zero-Knowledge Proofs

 zk (1)

Zero-Knowledge Proofs

 zk-proofs (1)

Zero-Knowledge Proofs