메뉴 건너뛰기




Volumn 8617 LNCS, Issue PART 2, 2014, Pages 458-475

Amortizing garbled circuits

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84905386312     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-44381-1_26     Document Type: Conference Paper
Times cited : (56)

References (27)
  • 1
    • 84884493672 scopus 로고    scopus 로고
    • Encoding functions with constant online rate or how to compress garbled circuits keys
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Applebaum, B., Ishai, Y., Kushilevitz, E., Waters, B.: Encoding functions with constant online rate or how to compress garbled circuits keys. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 166-184. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 166-184
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3    Waters, B.4
  • 2
    • 84928743703 scopus 로고
    • Precomputing oblivious transfer
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 97-109
    • Beaver, D.1
  • 3
    • 84871597758 scopus 로고    scopus 로고
    • Adaptively secure garbling with applications to one-time programs and secure outsourcing
    • Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
    • Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to one-time programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134-153. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7658 , pp. 134-153
    • Bellare, M.1    Hoang, V.T.2    Rogaway, P.3
  • 4
    • 84884472579 scopus 로고    scopus 로고
    • Highlyscalable searchable symmetric encryption with support for boolean queries
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
    • Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highlyscalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353-373. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8042 , pp. 353-373
    • Cash, D.1    Jarecki, S.2    Jutla, C.3    Krawczyk, H.4    Roşu, M.-C.5    Steiner, M.6
  • 5
    • 77956992852 scopus 로고    scopus 로고
    • Multiparty computation for dishonest majority: From passive to active security at low cost
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Damgård, I., Orlandi, C.: Multiparty computation for dishonest majority: From passive to active security at low cost. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 558-576. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 558-576
    • Damgård, I.1    Orlandi, C.2
  • 6
    • 84883362608 scopus 로고    scopus 로고
    • Mini-LEGO: Efficient secure two-party computation from general assumptions
    • Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
    • Frederiksen, T.K., Jakobsen, T.P., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: Mini-LEGO: Efficient secure two-party computation from general assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 537-556. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7881 , pp. 537-556
    • Frederiksen, T.K.1    Jakobsen, T.P.2    Nielsen, J.B.3    Nordholt, P.S.4    Orlandi, C.5
  • 7
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 8
    • 84869456660 scopus 로고    scopus 로고
    • Secure two-party computation in sublinear (amortized) time
    • Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press
    • Gordon, S.D., Katz, J., Kolesnikov, V., Krell, F., Malkin, T., Raykova, M., Vahlis, Y.: Secure two-party computation in sublinear (amortized) time. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 513-524. ACM Press (2012)
    • (2012) ACM CCS 2012 , pp. 513-524
    • Gordon, S.D.1    Katz, J.2    Kolesnikov, V.3    Krell, F.4    Malkin, T.5    Raykova, M.6    Vahlis, Y.7
  • 9
    • 84884477218 scopus 로고    scopus 로고
    • Efficient secure two-party computation using symmetric cut-and-choose
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Huang, Y., Katz, J., Evans, D.: Efficient secure two-party computation using symmetric cut-and-choose. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 18-35. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 18-35
    • Huang, Y.1    Katz, J.2    Evans, D.3
  • 10
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 11
    • 51849102397 scopus 로고    scopus 로고
    • Founding cryptography on oblivious transfer - Efficiently
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 572-591
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3
  • 12
    • 84889073373 scopus 로고    scopus 로고
    • Outsourced symmetric private information retrieval
    • Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM Press
    • Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Outsourced symmetric private information retrieval. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 875-888. ACM Press (2013)
    • (2013) ACM CCS 2013 , pp. 875-888
    • Jarecki, S.1    Jutla, C.S.2    Krawczyk, H.3    Rosu, M.C.4    Steiner, M.5
  • 14
    • 84884490479 scopus 로고    scopus 로고
    • Fast cut-and-choose based protocols for malicious and covert adversaries
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 1-17. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 1-17
    • Lindell, Y.1
  • 15
    • 38049136534 scopus 로고    scopus 로고
    • An efficient protocol for secure two-party computation in the presence of malicious adversaries
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 52-78
    • Lindell, Y.1    Pinkas, B.2
  • 16
    • 79953241261 scopus 로고    scopus 로고
    • Secure two-party computation via cut-and-choose oblivious transfer
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 329-346
    • Lindell, Y.1    Pinkas, B.2
  • 17
    • 84905395558 scopus 로고    scopus 로고
    • Cut-and-choose secure computation in the online/offline and batch settings
    • Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. Springer, Heidelberg
    • Lindell, Y., Riva, B.: Cut-and-choose secure computation in the online/offline and batch settings. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 476-494. Springer, Heidelberg (2014)
    • (2014) LNCS , vol.8617 , pp. 476-494
    • Lindell, Y.1    Riva, B.2
  • 18
    • 85084163840 scopus 로고    scopus 로고
    • Fairplay - A secure two-party computation system
    • Blaze, M. (ed.) USENIX Association August
    • Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: Blaze, M. (ed.) 13th USENIX Security Symposium. USENIX Association (August 2004)
    • (2004) 13th USENIX Security Symposium
    • Malkhi, D.1    Nisan, N.2    Pinkas, B.3    Sella, Y.4
  • 20
    • 84884472737 scopus 로고    scopus 로고
    • Garbled circuits checking garbled circuits: More efficient and secure two-party computation
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Mohassel, P., Riva, B.: Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 36-53. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 36-53
    • Mohassel, P.1    Riva, B.2
  • 21
    • 84865506559 scopus 로고    scopus 로고
    • A new approach to practical active-secure two-party computation
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 681-700
    • Nielsen, J.B.1    Nordholt, P.S.2    Orlandi, C.3    Burra, S.S.4
  • 22
    • 70350634167 scopus 로고    scopus 로고
    • LEGO for two-party secure computation
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Nielsen, J.B., Orlandi, C.: LEGO for two-party secure computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 368-386
    • Nielsen, J.B.1    Orlandi, C.2
  • 24
    • 35248883427 scopus 로고    scopus 로고
    • Fair secure two-party computation
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1
  • 25
    • 79958017670 scopus 로고    scopus 로고
    • Two-Output Secure Computation with Malicious Adversaries
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • shelat, A., Shen, C.-h.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 386-405
    • Shelat, A.1    Shen, C.-H.2
  • 26
    • 38049107739 scopus 로고    scopus 로고
    • Revisiting the efficiency of malicious two-party computation
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Woodruff, D.P.: Revisiting the efficiency of malicious two-party computation. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 79-96. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 79-96
    • Woodruff, D.P.1
  • 27
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • (extended abstract). IEEE Computer Society Press October
    • Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th FOCS, pp. 162-167. IEEE Computer Society Press (October 1986)
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.