메뉴 건너뛰기




Volumn , Issue , 2011, Pages 715-724

VMCrypt - Modular software architecture for scalable secure computation

Author keywords

Scalable; Secure computation; Software API

Indexed keywords

GARBLED CIRCUITS; NOVEL ALGORITHM; PROGRAMMING INTERFACE; SCALABLE; SECURE COMPUTATION; SMALL MEMORY REQUIREMENTS; SOFTWARE API; SOURCE CODES;

EID: 80755168310     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046787     Document Type: Conference Paper
Times cited : (47)

References (31)
  • 3
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
    • (2008) ESORICS , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 5
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Public Key Cryptography
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography, pages 119-136, 2001. (Pubitemid 33232937)
    • (2001) Lecture Notes in Computer Science , Issue.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 6
    • 77956992852 scopus 로고    scopus 로고
    • Multiparty computation for dishonest majority: From passive to active security at low cost
    • I. Damgård and C. Orlandi. Multiparty computation for dishonest majority: From passive to active security at low cost. In CRYPTO, pages 558-576, 2010.
    • (2010) CRYPTO , pp. 558-576
    • Damgård, I.1    Orlandi, C.2
  • 10
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, pages 169-178, 2009.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 14
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, pages 1-20, 2009.
    • (2009) CANS , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 16
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of yao's protocol for two-party computation. J. Cryptology, 22(2):161-188, 2009.
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 17
    • 52149120767 scopus 로고    scopus 로고
    • Implementing two-party computation efficiently with security against malicious adversaries
    • Y. Lindell, B. Pinkas, and N. P. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In SCN, pages 2-20, 2008.
    • (2008) SCN , pp. 2-20
    • Lindell, Y.1    Pinkas, B.2    Smart, N.P.3
  • 20
    • 80054814127 scopus 로고    scopus 로고
    • VMCrypt - Modular software architecture for scalable secure computation
    • L. Malka. VMCrypt - modular software architecture for scalable secure computation. EPrint report 2010/584, 2010.
    • (2010) EPrint Report 2010/584
    • Malka, L.1
  • 22
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In SODA, pages 448-457, 2001.
    • (2001) SODA , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 26
    • 68849099052 scopus 로고    scopus 로고
    • Practical secure evaluation of semi-private functions
    • A. Paus, A.-R. Sadeghi, and T. Schneider. Practical secure evaluation of semi-private functions. In ACNS, pages 89-106, 2009.
    • (2009) ACNS , pp. 89-106
    • Paus, A.1    Sadeghi, A.-R.2    Schneider, T.3
  • 28
    • 77954610725 scopus 로고    scopus 로고
    • Efficient privacy-preserving face recognition
    • A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Efficient privacy-preserving face recognition. In ICISC, pages 229-244, 2009.
    • (2009) ICISC , pp. 229-244
    • Sadeghi, A.-R.1    Schneider, T.2    Wehrenberg, I.3
  • 29
    • 79955532534 scopus 로고    scopus 로고
    • Fully homomorphic encryption with relatively small key and ciphertext sizes
    • N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography, pages 420-443, 2010.
    • (2010) Public Key Cryptography , pp. 420-443
    • Smart, N.P.1    Vercauteren, F.2
  • 31
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.