-
1
-
-
79958004492
-
Semi-homomorphic encryption and multiparty computation
-
Berlin, Heidelberg, EUROCRYPT’11, Springer-Verlag
-
BENDLIN, R., DAMGÅRD, I., ORLANDI, C., AND ZAKARIAS, S. Semi-homomorphic encryption and multiparty computation. In Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology (Berlin, Heidelberg, 2011), EUROCRYPT’11, Springer-Verlag, pp. 169–188.
-
(2011)
Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology
, pp. 169-188
-
-
Bendlin, R.1
Damgård, I.2
Orlandi, C.3
Zakarias, S.4
-
2
-
-
70350379222
-
Secure multiparty computation goes live
-
BOGETOFT, P., CHRISTENSEN, D. L., DAMGÅRD, I., GEISLER, M., JAKOBSEN, T. P., KRØIGAARD, M., NIELSEN, J. D., NIELSEN, J. B., NIELSEN, K., PAGTER, J., SCHWARTZBACH, M. I., AND TOFT, T. Secure Multiparty Computation Goes Live. In Financial Cryptography (2009), pp. 325–343.
-
(2009)
Financial Cryptography
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.P.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
3
-
-
77954990110
-
A new combinational logic minimization technique with applications to cryptology
-
Berlin, Heidelberg, SEA’10, Springer-Verlag
-
BOYAR, J., AND PERALTA, R. A new combinational logic minimization technique with applications to cryptology. In Proceedings of the 9th international conference on Experimental Algorithms (Berlin, Heidelberg, 2010), SEA’10, Springer-Verlag, pp. 178–189.
-
(2010)
Proceedings of the 9th International Conference on Experimental Algorithms
, pp. 178-189
-
-
Boyar, J.1
Peralta, R.2
-
4
-
-
33646793331
-
Privacy-preserving graph algorithms in the semi-honest model
-
Berlin, Heidelberg, ASIACRYPT’05, Springer-Verlag
-
BRICKELL, J., AND SHMATIKOV, V. Privacy-preserving graph algorithms in the semi-honest model. In Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security (Berlin, Heidelberg, 2005), ASIACRYPT’05, Springer-Verlag, pp. 236–252.
-
(2005)
Proceedings of the 11th International Conference on Theory and Application of Cryptology and Information Security
, pp. 236-252
-
-
Brickell, J.1
Shmatikov, V.2
-
5
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
New York, NY, USA, STOC’02, ACM
-
CANETTI, R., LINDELL, Y., OSTROVSKY, R., AND SAHAI, A. Universally composable two-party and multi-party secure computation. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing (New York, NY, USA, 2002), STOC’02, ACM, pp. 494–503.
-
(2002)
Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
6
-
-
84863382720
-
On the security of the”free-XOR” technique
-
Berlin, Heidelberg, TCC’12, Springer-Verlag
-
CHOI, S. G., KATZ, J., KUMARESAN, R., AND ZHOU, H.-S. On the security of the”free-xor” technique. In Proceedings of the 9th international conference on Theory of Cryptography (Berlin, Heidelberg, 2012), TCC’12, Springer-Verlag, pp. 39–53.
-
(2012)
Proceedings of the 9th International Conference on Theory of Cryptography
, pp. 39-53
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.-S.4
-
7
-
-
84864975035
-
Multiparty computation from somewhat homomorphic encryption
-
CRYPTO’12
-
DAMGARD, I., PASTRO, V., SMART, N., AND ZAKARIAS, S. Multiparty Computation from Somewhat Homomorphic Encryption. In Proceedings of the 32th Annual International Cryptology Conference on Advances in Cryptology (2012), CRYPTO’12. http://eprint.iacr.org/2011/535.
-
(2012)
Proceedings of the 32th Annual International Cryptology Conference on Advances in Cryptology
-
-
Damgard, I.1
Pastro, V.2
Smart, N.3
Zakarias, S.4
-
9
-
-
0000416130
-
Complexity results for bandwidth minimization
-
GAREY, M., GRAHAM, R., JOHNSON, D., AND KNUTH, D. Complexity results for bandwidth minimization. SIAM Journal on Applied Mathematics 34, 3 (1978), 477–495.
-
(1978)
SIAM Journal on Applied Mathematics
, vol.34
, Issue.3
, pp. 477-495
-
-
Garey, M.1
Graham, R.2
Johnson, D.3
Knuth, D.4
-
11
-
-
44449160882
-
Efficient two party and multi party computation against covert adversaries
-
Berlin, Heidelberg, EUROCRYPT’08, Springer-Verlag
-
GOYAL, V., MOHASSEL, P., AND SMITH, A. Efficient two party and multi party computation against covert adversaries. In Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology (Berlin, Heidelberg, 2008), EUROCRYPT’08, Springer-Verlag, pp. 289–306.
-
(2008)
Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
12
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
New York, NY, USA, CCS’10, ACM
-
HENECKA, W., K ÖGL, S., SADEGHI, A.-R., SCHNEIDER, T., AND WEHRENBERG, I. Tasty: tool for automating secure two-party computations. In Proceedings of the 17th ACM conference on Computer and communications security (New York, NY, USA, 2010), CCS’10, ACM, pp. 451–462.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 451-462
-
-
Henecka, W.1
K Ögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
13
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Berkeley, CA, USA, SEC’11, USENIX Association
-
HUANG, Y., EVANS, D., KATZ, J., AND MALKA, L. Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC’11, USENIX Association, pp. 35–35.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 35
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
14
-
-
84899756503
-
Efficient privacy-preserving biometric identification
-
HUANG, Y., MALKA, L., EVANS, D., AND KATZ, J. Efficient Privacy-Preserving Biometric Identification. In NDSS’11 (2011).
-
(2011)
NDSS’11
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
15
-
-
24144457853
-
Extending oblivious transfers efficiently
-
of LNCS. Springer Berlin / Heidelberg
-
ISHAI, Y., KILIAN, J., NISSIM, K., AND PETRANK, E. Extending Oblivious Transfers Efficiently. In CRYPTO’03, vol. 2729 of LNCS. Springer Berlin / Heidelberg, 2003, pp. 145–161.
-
(2003)
CRYPTO’03
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
16
-
-
51849102397
-
Founding cryptography on oblivious transfer — Efficiently
-
Berlin, Heidelberg, CRYPTO 2008, Springer-Verlag
-
ISHAI, Y., PRABHAKARAN, M., AND SAHAI, A. Founding cryptography on oblivious transfer — efficiently. In Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology (Berlin, Heidelberg, 2008), CRYPTO 2008, Springer-Verlag, pp. 572–591.
-
(2008)
Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
17
-
-
50249177701
-
Towards practical privacy for genomic computation
-
Washington, DC, USA, SP’08, IEEE Computer Society
-
JHA, S., KRUGER, L., AND SHMATIKOV, V. Towards practical privacy for genomic computation. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2008), SP’08, IEEE Computer Society, pp. 216–230.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
20
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Berlin, Heidelberg, ICALP’08, Springer-Verlag
-
KOLESNIKOV, V., AND SCHNEIDER, T. Improved garbled circuit: Free xor gates and applications. In Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II (Berlin, Heidelberg, 2008), ICALP’08, Springer-Verlag, pp. 486–498.
-
(2008)
Proceedings of the 35th International Colloquium on Automata, Languages and Programming, Part II
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
21
-
-
80052009576
-
The IPS compiler: Optimizations, variants and concrete efficiency
-
LINDELL, Y., OXMAN, E., AND PINKAS, B. The IPS Compiler: Optimizations, Variants and Concrete Efficiency. In CRYPTO’11 (2011), pp. 259–276.
-
(2011)
CRYPTO’11
, pp. 259-276
-
-
Lindell, Y.1
Oxman, E.2
Pinkas, B.3
-
22
-
-
84974555530
-
Privacy preserving data mining
-
London, UK, UK, CRYPTO’00, Springer-Verlag
-
LINDELL, Y., AND PINKAS, B. Privacy preserving data mining. In Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology (London, UK, UK, 2000), CRYPTO’00, Springer-Verlag, pp. 36–54.
-
(2000)
Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
23
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Berlin, Heidelberg, EUROCRYPT’07, Springer-Verlag
-
LINDELL, Y., AND PINKAS, B. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Proceedings of the 26th annual international conference on Advances in Cryptology (Berlin, Heidelberg, 2007), EUROCRYPT’07, Springer-Verlag, pp. 52–78.
-
(2007)
Proceedings of the 26th Annual International Conference on Advances in Cryptology
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
Berlin, Heidelberg, TCC’11, Springer-Verlag
-
LINDELL, Y., AND PINKAS, B. Secure two-party computation via cut-and-choose oblivious transfer. In Proceedings of the 8th conference on Theory of cryptography (Berlin, Heidelberg, 2011), TCC’11, Springer-Verlag, pp. 329–346.
-
(2011)
Proceedings of the 8th Conference on Theory of Cryptography
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
80755168310
-
VMcrypt: Modular software architecture for scalable secure computation
-
New York, NY, USA, CCS’11, ACM
-
MALKA, L. Vmcrypt: modular software architecture for scalable secure computation. In Proceedings of the 18th ACM conference on Computer and communications security (New York, NY, USA, 2011), CCS’11, ACM, pp. 715–724.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 715-724
-
-
Malka, L.1
-
27
-
-
33745843587
-
Efficiency tradeoffs for malicious two-party computation
-
Berlin, Heidelberg, PKC’06, Springer-Verlag
-
MOHASSEL, P., AND FRANKLIN, M. Efficiency tradeoffs for malicious two-party computation. In Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography (Berlin, Heidelberg, 2006), PKC’06, Springer-Verlag, pp. 458–473.
-
(2006)
Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography
, pp. 458-473
-
-
Mohassel, P.1
Franklin, M.2
-
28
-
-
84865506559
-
A new approach to practical active-secure two-party computation
-
CRYPTO’12
-
NIELSEN, J. B., NORDHOLT, P. S., ORLANDI, C., AND BURRA, S. S. A New Approach to Practical Active-Secure Two-Party Computation. In Proceedings of the 32th Annual International Cryptology Conference on Advances in Cryptology (2012), CRYPTO’12. http://eprint.iacr.org/2011/091.
-
(2012)
Proceedings of the 32th Annual International Cryptology Conference on Advances in Cryptology
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
29
-
-
77955178939
-
Scifi - A system for secure face identification
-
Washington, DC, USA, SP’10, IEEE Computer Society
-
OSADCHY, M., PINKAS, B., JARROUS, A., AND MOSKOVICH, B. Scifi - a system for secure face identification. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2010), SP’10, IEEE Computer Society, pp. 239–254.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
30
-
-
72449131818
-
Secure two-party computation is practical
-
Berlin, Heidelberg, ASIACRYPT’09, Springer-Verlag
-
PINKAS, B., SCHNEIDER, T., SMART, N. P., AND WILLIAMS, S. C. Secure two-party computation is practical. In Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (Berlin, Heidelberg, 2009), ASIACRYPT’09, Springer-Verlag, pp. 250–267.
-
(2009)
Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
31
-
-
85076212832
-
-
RELIC. http://code.google.com/p/relic-toolkit/.
-
-
-
-
32
-
-
79958017670
-
Two-output secure computation with malicious adversaries
-
Berlin, Heidelberg, EUROCRYPT’11, Springer-Verlag
-
SHELAT, A., AND SHEN, C.-H. Two-output secure computation with malicious adversaries. In Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology (Berlin, Heidelberg, 2011), EUROCRYPT’11, Springer-Verlag, pp. 386–405.
-
(2011)
Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
-
33
-
-
0020312165
-
Protocols for secure computations
-
Washington, DC, USA, SFCS’82, IEEE Computer Society
-
YAO, A. C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (Washington, DC, USA, 1982), SFCS’82, IEEE Computer Society, pp. 160–164.
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
|