-
1
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann and Y. Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. Journal of Cryptology, 23(2):281-343, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 281-343
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
33751508709
-
-
March
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid. NIST special publication 800-57: Recommendation for key management - part 1, March 2007.
-
(2007)
NIST Special Publication 800-57: Recommendation for Key Management - Part 1
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
3
-
-
84976804419
-
How to exchange (secret) keys
-
M. Blum. How to exchange (secret) keys. ACM Transactions on Computer Systems, 1(2):175-193, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
4
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
5
-
-
68949136946
-
Efficient robust private set intersection
-
7th Intl. Conference on Applied Cryptography and Network Security (ACNS), Springer
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In 7th Intl. Conference on Applied Cryptography and Network Security (ACNS), volume 5536 of LNCS, pages 125-142. Springer, 2009.
-
(2009)
LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
6
-
-
0029362450
-
Practical and provably secure release of a secret and exchange of signatures
-
I. Damgård. Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology, 8(4):201-222, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.1
-
7
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
Advances in Cryptology - Asiacrypt 2010, Springer
-
E. De Cristofaro, J. Kim, and G. Tsudik. Linear-complexity private set intersection protocols secure in malicious model. In Advances in Cryptology - Asiacrypt 2010, volume 6477 of LNCS, pages 213-231. Springer, 2010.
-
(2010)
LNCS
, vol.6477
, pp. 213-231
-
-
De Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
8
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
9
-
-
35048820609
-
Efficient private matching and set intersection
-
Advances in Cryptology - Eurocrypt 2004, Springer
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of LNCS, pages 1-19. Springer, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
10
-
-
78649820323
-
Basic Applications
-
Cambridge University Press, Cambridge, UK
-
O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, Cambridge, UK, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
11
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game, or a completeness theorem for protocols with honest majority. In 19th Annual ACM Symposium on Theory of Computing (STOC), pages 218-229. ACM Press, 1987.
-
(1987)
19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
40249091385
-
OT-combiners via secure computation
-
5th Theory of Cryptography Conference - TCC 2008, Springer
-
D. Harnik, Y. Ishai, E. Kushilevitz, and J. B. Nielsen. OT-combiners via secure computation. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 393-411. Springer, 2008.
-
(2008)
LNCS
, vol.4948
, pp. 393-411
-
-
Harnik, D.1
Ishai, Y.2
Kushilevitz, E.3
Nielsen, J.B.4
-
13
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
5th Theory of Cryptography Conference - TCC 2008, Springer
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 155-175. Springer, 2008.
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
14
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
ACM Press
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: tool for automating secure two-party computations. In 17th ACM Conf. on Computer and Communications Security (CCS), pages 451-462. ACM Press, 2010.
-
(2010)
17th ACM Conf. on Computer and Communications Security (CCS)
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
17
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
The Internet Society
-
Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In Network and Distributed System Security Symposium (NDSS), pages 421-434. The Internet Society, 2011.
-
(2011)
Network and Distributed System Security Symposium (NDSS)
, pp. 421-434
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
18
-
-
85028775577
-
Direct minimum-knowledge computations
-
Advances in Cryptology - Crypto '87, Springer
-
R. Impagliazzo and M. Yung. Direct minimum-knowledge computations. In Advances in Cryptology - Crypto '87, volume 293 of LNCS, pages 40-51. Springer, 1988.
-
(1988)
LNCS
, vol.293
, pp. 40-51
-
-
Impagliazzo, R.1
Yung, M.2
-
19
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In Advances in Cryptology - Crypto 2003, volume 2729 of LNCS, pages 145-161. Springer, 2003. (Pubitemid 137636940)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
20
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
6th Theory of Cryptography Conference - TCC 2009, Springer
-
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In 6th Theory of Cryptography Conference - TCC 2009, volume 5444 of LNCS, pages 577-594. Springer, 2009.
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
21
-
-
77958056561
-
Fast secure computation of set intersection
-
7th Intl. Conf. on Security and Cryptography for Networks, Springer
-
S. Jarecki and X. Liu. Fast secure computation of set intersection. In 7th Intl. Conf. on Security and Cryptography for Networks, volume 6280 of LNCS, pages 418-435. Springer, 2010.
-
(2010)
LNCS
, vol.6280
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
22
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Advances in Cryptology - Eurocrypt 2007, Springer
-
S. Jarecki and V. Shmatikov. Efficient two-party secure computation on committed inputs. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 97-114. Springer, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
23
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
35th Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, Springer
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In 35th Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, volume 5126 of LNCS, pages 486-498. Springer, 2008.
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
24
-
-
80052009576
-
The IPS compiler: Optimizations, variants and concrete efficiency
-
Advances in Cryptology - Crypto 2011, Springer
-
Y. Lindell, E. Oxman, and B. Pinkas. The IPS compiler: Optimizations, variants and concrete efficiency. In Advances in Cryptology - Crypto 2011, volume 6841 of LNCS, pages 259-276. Springer, 2011.
-
(2011)
LNCS
, vol.6841
, pp. 259-276
-
-
Lindell, Y.1
Oxman, E.2
Pinkas, B.3
-
25
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Advances in Cryptology - Eurocrypt 2007, Springer
-
Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - Eurocrypt 2007, volume 4515 of LNCS, pages 52-78. Springer, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology, 22(2):161-188, 2009.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
27
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
8th Theory of Cryptography Conference - TCC 2011, Springer
-
Y. Lindell and B. Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. In 8th Theory of Cryptography Conference - TCC 2011, volume 6597 of LNCS, pages 329-346. Springer, 2011.
-
(2011)
LNCS
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
28
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), Springer
-
Y. Lindell, B. Pinkas, and N. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In 6th Intl. Conf. on Security and Cryptography for Networks (SCN '08), volume 5229 of LNCS, pages 2-20. Springer, 2008.
-
(2008)
LNCS
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.3
-
30
-
-
33745843587
-
Efficiency tradeoffs for malicious two-party computation
-
9th Intl. Conference on Theory and Practice of Public Key Cryptography(PKC 2006), Springer
-
P. Mohassel and M. Franklin. Efficiency tradeoffs for malicious two-party computation. In 9th Intl. Conference on Theory and Practice of Public Key Cryptography(PKC 2006), volume 3958 of LNCS, pages 458-473. Springer, 2006.
-
(2006)
LNCS
, vol.3958
, pp. 458-473
-
-
Mohassel, P.1
Franklin, M.2
-
33
-
-
70350634167
-
LEGO for two-party secure computation
-
6th Theory of Cryptography Conference - TCC 2009, Springer
-
J. B. Nielsen and C. Orlandi. LEGO for two-party secure computation. In 6th Theory of Cryptography Conference - TCC 2009, volume 5444 of LNCS, pages 368-386. Springer, 2009.
-
(2009)
LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
34
-
-
72449131818
-
Secure two-party computation is practical
-
Advances in Cryptology - Asiacrypt 2009, Springer
-
B. Pinkas, T. Schneider, N. Smart, and S. Williams. Secure two-party computation is practical. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 250-267. Springer, 2009.
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.3
Williams, S.4
-
35
-
-
79958017670
-
Two-output secure computation with malicious adversaries
-
Advances in Cryptology - Eurocrypt 2011, Springer
-
A. Shelat and C.-H. Shen. Two-output secure computation with malicious adversaries. In Advances in Cryptology - Eurocrypt 2011, volume 6632 of LNCS, pages 386-405. Springer, 2011.
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
|