메뉴 건너뛰기




Volumn 8617 LNCS, Issue PART 2, 2014, Pages 440-457

FleXOR: Flexible garbling for XOR gates that beats free-XOR

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84905375066     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44381-1_25     Document Type: Conference Paper
Times cited : (75)

References (21)
  • 1
    • 84873969684 scopus 로고    scopus 로고
    • Garbling XOR gates "For free" in the standard model
    • Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
    • Applebaum, B.: Garbling XOR gates "For free" in the standard model. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 162-181. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7785 , pp. 162-181
    • Applebaum, B.1
  • 2
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • (extended abstract). ACM Press
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: 22nd ACM STOC, pp. 503-513. ACM Press (1990)
    • (1990) 22nd ACM STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 3
    • 84869382999 scopus 로고    scopus 로고
    • Foundations of garbled circuits
    • Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press
    • Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 784-796. ACM Press (2012)
    • (2012) ACM CCS 2012 , pp. 784-796
    • Bellare, M.1    Hoang, V.T.2    Rogaway, P.3
  • 5
    • 84863382720 scopus 로고    scopus 로고
    • On the security of the "Free- XOR" technique
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the security of the "Free- XOR" technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 39-53
    • Choi, S.G.1    Katz, J.2    Kumaresan, R.3    Zhou, H.-S.4
  • 6
    • 51849125042 scopus 로고    scopus 로고
    • Scalable multiparty computation with nearly optimal work and resilience
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241-261. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 241-261
    • Damgård, I.1    Ishai, Y.2    Krøigaard, M.3    Nielsen, J.B.4    Smith, A.5
  • 8
    • 84884482346 scopus 로고    scopus 로고
    • A dynamic tradeoff between active and passive corruptions in secure multi-party computation
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Hirt, M., Maurer, U., Lucas, C.: A dynamic tradeoff between active and passive corruptions in secure multi-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 203-219. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 203-219
    • Hirt, M.1    Maurer, U.2    Lucas, C.3
  • 9
    • 84892384788 scopus 로고    scopus 로고
    • Efficient general-adversary multi-party computation
    • Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. Springer, Heidelberg
    • Hirt, M., Tschudi, D.: Efficient general-adversary multi-party computation. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 181-200. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8270 , pp. 181-200
    • Hirt, M.1    Tschudi, D.2
  • 10
    • 84884477218 scopus 로고    scopus 로고
    • Efficient secure two-party computation using symmetric cut-and-choose
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Huang, Y., Katz, J., Evans, D.: Efficient secure two-party computation using symmetric cut-and-choose. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 18-35. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 18-35
    • Huang, Y.1    Katz, J.2    Evans, D.3
  • 11
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 12
    • 33646813314 scopus 로고    scopus 로고
    • Gate evaluation secret sharing and secure one-round two-party computation
    • Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
    • Kolesnikov, V.: Gate evaluation secret sharing and secure one-round two-party computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 136-155. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 136-155
    • Kolesnikov, V.1
  • 13
    • 84866677530 scopus 로고    scopus 로고
    • Improved secure two-party computation via information-theoretic garbled circuits
    • Visconti, I., De Prisco, R. (eds.) SCN 2012. Springer, Heidelberg
    • Kolesnikov, V., Kumaresan, R.: Improved secure two-party computation via information-theoretic garbled circuits. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 205-221. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7485 , pp. 205-221
    • Kolesnikov, V.1    Kumaresan, R.2
  • 14
    • 84884483426 scopus 로고    scopus 로고
    • Improved OT extension for transferring short secrets
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Kolesnikov, V., Kumaresan, R.: Improved OT extension for transferring short secrets. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 54-70. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 54-70
    • Kolesnikov, V.1    Kumaresan, R.2
  • 15
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 16
    • 84884490479 scopus 로고    scopus 로고
    • Fast cut-and-choose based protocols for malicious and covert adversaries
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 1-17
    • Lindell, Y.1
  • 17
    • 84884472737 scopus 로고    scopus 로고
    • Garbled circuits checking garbled circuits: More efficient and secure two-party computation
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Mohassel, P., Riva, B.: Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 36-53. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 36-53
    • Mohassel, P.1    Riva, B.2
  • 19
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 20
    • 79958017670 scopus 로고    scopus 로고
    • Two-output secure computation with malicious adversaries
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Shelat, A., Shen, C.-H.: Two-output secure computation with malicious adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.