-
1
-
-
84884493672
-
Encoding functions with constant online rate or how to compress garbled circuits keys
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E., Waters, B.: Encoding functions with constant online rate or how to compress garbled circuits keys. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 166-184. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 166-184
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
Waters, B.4
-
2
-
-
84928743703
-
Precomputing oblivious transfer
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
3
-
-
84871597758
-
Adaptively secure garbling with applications to one-time programs and secure outsourcing
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
-
Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to one-time programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134-153. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 134-153
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
4
-
-
84884472579
-
Highlyscalable searchable symmetric encryption with support for boolean queries
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
-
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M.-C., Steiner, M.: Highlyscalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353-373. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8042
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Roşu, M.-C.5
Steiner, M.6
-
5
-
-
77956992852
-
Multiparty computation for dishonest majority: From passive to active security at low cost
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Damgård, I., Orlandi, C.: Multiparty computation for dishonest majority: From passive to active security at low cost. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 558-576. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 558-576
-
-
Damgård, I.1
Orlandi, C.2
-
6
-
-
84883362608
-
Mini-LEGO: Efficient secure two-party computation from general assumptions
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Frederiksen, T.K., Jakobsen, T.P., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: Mini-LEGO: Efficient secure two-party computation from general assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 537-556. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 537-556
-
-
Frederiksen, T.K.1
Jakobsen, T.P.2
Nielsen, J.B.3
Nordholt, P.S.4
Orlandi, C.5
-
7
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
8
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press
-
Gordon, S.D., Katz, J., Kolesnikov, V., Krell, F., Malkin, T., Raykova, M., Vahlis, Y.: Secure two-party computation in sublinear (amortized) time. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 513-524. ACM Press (2012)
-
(2012)
ACM CCS 2012
, pp. 513-524
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
9
-
-
84884477218
-
Efficient secure two-party computation using symmetric cut-and-choose
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Huang, Y., Katz, J., Evans, D.: Efficient secure two-party computation using symmetric cut-and-choose. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 18-35. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 18-35
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
10
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
11
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
12
-
-
84889073373
-
Outsourced symmetric private information retrieval
-
Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM Press
-
Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.C., Steiner, M.: Outsourced symmetric private information retrieval. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 875-888. ACM Press (2013)
-
(2013)
ACM CCS 2013
, pp. 875-888
-
-
Jarecki, S.1
Jutla, C.S.2
Krawczyk, H.3
Rosu, M.C.4
Steiner, M.5
-
14
-
-
84884490479
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 1-17. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 1-17
-
-
Lindell, Y.1
-
15
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
16
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
17
-
-
84905395558
-
Cut-and-choose secure computation in the online/offline and batch settings
-
Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. Springer, Heidelberg
-
Lindell, Y., Riva, B.: Cut-and-choose secure computation in the online/offline and batch settings. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part II. LNCS, vol. 8617, pp. 476-494. Springer, Heidelberg (2014)
-
(2014)
LNCS
, vol.8617
, pp. 476-494
-
-
Lindell, Y.1
Riva, B.2
-
18
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Blaze, M. (ed.) USENIX Association August
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: Blaze, M. (ed.) 13th USENIX Security Symposium. USENIX Association (August 2004)
-
(2004)
13th USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
19
-
-
33745843587
-
Efficiency tradeoffs for malicious two-party computation
-
DOI 10.1007/11745853-30, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
Mohassel, P., Franklin, M.: Efficiency tradeoffs for malicious two-party computation. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 458-473. Springer, Heidelberg (2006) (Pubitemid 44029599)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958 LNCS
, pp. 458-473
-
-
Mohassel, P.1
Franklin, M.2
-
20
-
-
84884472737
-
Garbled circuits checking garbled circuits: More efficient and secure two-party computation
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Mohassel, P., Riva, B.: Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 36-53. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 36-53
-
-
Mohassel, P.1
Riva, B.2
-
21
-
-
84865506559
-
A new approach to practical active-secure two-party computation
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 681-700
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
22
-
-
70350634167
-
LEGO for two-party secure computation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Nielsen, J.B., Orlandi, C.: LEGO for two-party secure computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
23
-
-
84914148700
-
Blind seer: A scalable private DBMS
-
IEEE Computer Society Press May
-
Pappas, V., Vo, B., Krell, F., Choi, S.G., Kolesnikov, V., Bellovin, S., Keromytis, A., Malkin, T.: Blind seer: A scalable private DBMS. In: 2014 IEEE Symposium on Security and Privacy. IEEE Computer Society Press (May 2014)
-
(2014)
2014 IEEE Symposium on Security and Privacy
-
-
Pappas, V.1
Vo, B.2
Krell, F.3
Choi, S.G.4
Kolesnikov, V.5
Bellovin, S.6
Keromytis, A.7
Malkin, T.8
-
24
-
-
35248883427
-
Fair secure two-party computation
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 87-105
-
-
Pinkas, B.1
-
25
-
-
79958017670
-
Two-Output Secure Computation with Malicious Adversaries
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
shelat, A., Shen, C.-h.: Two-Output Secure Computation with Malicious Adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
-
26
-
-
38049107739
-
Revisiting the efficiency of malicious two-party computation
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Woodruff, D.P.: Revisiting the efficiency of malicious two-party computation. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 79-96. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 79-96
-
-
Woodruff, D.P.1
-
27
-
-
0022882770
-
How to generate and exchange secrets
-
(extended abstract). IEEE Computer Society Press October
-
Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th FOCS, pp. 162-167. IEEE Computer Society Press (October 1986)
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.C.1
|