메뉴 건너뛰기




Volumn 7954 LNCS, Issue , 2013, Pages 339-356

Fast and maliciously secure two-party computation using the GPU

Author keywords

[No Author keywords available]

Indexed keywords

GARBLED CIRCUITS; NOVEL CONSTRUCTION; PARALLEL COMPUTATIONAL MODELS; SECURE PROTOCOLS; SECURE TWO-PARTY COMPUTATIONS; TWO-PARTY COMPUTATION;

EID: 84879859791     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38980-1_21     Document Type: Conference Paper
Times cited : (19)

References (25)
  • 1
    • 0029702967 scopus 로고    scopus 로고
    • Correlated pseudorandomness and the complexity of private computations
    • ACM
    • Beaver, D.: Correlated pseudorandomness and the complexity of private computations. In: STOC 1996, pp. 479-488. ACM (1996)
    • (1996) STOC 1996 , pp. 479-488
    • Beaver, D.1
  • 2
    • 70350379222 scopus 로고    scopus 로고
    • Secure multiparty computation goes live
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 325-343
    • Bogetoft, P.1
  • 4
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • ACM
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC 1987, pp. 218-229. ACM (1987)
    • (1987) STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 8
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 9
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer - efficiently
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 10
    • 80755188493 scopus 로고    scopus 로고
    • From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design
    • Report 2010/079
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design. Cryptology ePrint Archive, Report 2010/079 (2010), http://eprint.iacr.org/
    • (2010) Cryptology ePrint Archive
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 11
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Aceto, L., Damg?ard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damg?ard, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 13
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 14
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of yao's protocol for two-party computation
    • Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 15
    • 79953241261 scopus 로고    scopus 로고
    • Secure two-party computation via cut-and-choose oblivious transfer
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 84865506559 scopus 로고    scopus 로고
    • A new approach to practical active-secure two-party computation
    • Safavi-Naini, R. (ed.) CRYPTO 2012. Springer, Heidelberg
    • Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R. (ed.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 681-700
    • Nielsen, J.B.1    Nordholt, P.S.2    Orlandi, C.3    Burra, S.S.4
  • 19
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for two-party secure computation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Nielsen, J.B., Orlandi, C.: LEGO for two-party secure computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 21
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 22
    • 84865821050 scopus 로고    scopus 로고
    • Fastplay-a parallelization model and implementation of SMC on cuda based GPU cluster architecture
    • Pu, S., Duan, P., Liu, J.-C.: Fastplay-a parallelization model and implementation of SMC on cuda based GPU cluster architecture. IACR Cryptology ePrint Archive, 2011:97 (2011)
    • (2011) IACR Cryptology ePrint Archive , vol.2011 , pp. 97
    • Pu, S.1    Duan, P.2    Liu, J.-C.3
  • 23
    • 79958017670 scopus 로고    scopus 로고
    • Two-Output Secure Computation with Malicious Adversaries
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Shelat, A., Shen, C.-H.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2
  • 25
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE
    • Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160-164. IEEE (1982)
    • (1982) FOCS 1982 , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.