-
1
-
-
84884493672
-
Encoding functions with constant online rate or how to compress garbled circuits keys
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Applebaum, B., Ishai, Y., Kushilevitz, E., Waters, B.: Encoding functions with constant online rate or how to compress garbled circuits keys. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 166-184. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 166-184
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
Waters, B.4
-
2
-
-
84889059259
-
More efficient oblivious transfer and extensions for faster secure computation
-
ACM
-
Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: CCS, pp. 535-548. ACM (2013)
-
(2013)
CCS
, pp. 535-548
-
-
Asharov, G.1
Lindell, Y.2
Schneider, T.3
Zohner, M.4
-
3
-
-
84884469524
-
Instantiating random oracles via uCEs
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Bellare, M., Hoang, V.T., Keelveedhi, S.: Instantiating random oracles via uCEs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 398-415. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 398-415
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
-
4
-
-
84871597758
-
Adaptively secure garbling with applications to one-time programs and secure outsourcing
-
Wang, X., Sako, K. (eds.) ASIACRYPT 2012. Springer, Heidelberg
-
Bellare, M., Hoang, V.T., Rogaway, P.: Adaptively secure garbling with applications to one-time programs and secure outsourcing. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 134-153. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7658
, pp. 134-153
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
5
-
-
84869382999
-
Foundations of garbled circuits
-
ACM
-
Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: CCS, pp. 784-796. ACM (2012)
-
(2012)
CCS
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
6
-
-
84884745031
-
Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits
-
Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
-
Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 1-18. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8134
, pp. 1-18
-
-
Damgård, I.1
Keller, M.2
Larraia, E.3
Pastro, V.4
Scholl, P.5
Smart, N.P.6
-
7
-
-
84864975035
-
Multiparty computation from somewhat homomorphic encryption
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643-662. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 643-662
-
-
Damgård, I.1
Pastro, V.2
Smart, N.3
Zakarias, S.4
-
8
-
-
84883362608
-
MiniLEGO: Efficient secure two-party computation from general assumptions
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Frederiksen, T.K., Jakobsen, T.P., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: MiniLEGO: Efficient secure two-party computation from general assumptions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 537-556. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 537-556
-
-
Frederiksen, T.K.1
Jakobsen, T.P.2
Nielsen, J.B.3
Nordholt, P.S.4
Orlandi, C.5
-
9
-
-
0023545076
-
How to play any mental game
-
ACM
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC, pp. 218-229. ACM (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
10
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)
-
USENIX Security Symposium (2011)
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
11
-
-
84905365822
-
Amortizing garbled circuits
-
Springer, Heidelberg
-
Huang, Y., Katz, J., Kolesnikov, V., Kumaresan, R., Malozemoff, A.J.: Amortizing garbled circuits. In: CRYPTO, Springer, Heidelberg (2014)
-
(2014)
CRYPTO
-
-
Huang, Y.1
Katz, J.2
Kolesnikov, V.3
Kumaresan, R.4
Malozemoff, A.J.5
-
12
-
-
84893267219
-
Gpu and cpu parallelization of honest-but-curious secure two-party computation
-
ACM
-
Husted, N., Myers, S., Shelat, A., Grubbs, P.: Gpu and cpu parallelization of honest-but-curious secure two-party computation. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 169-178. ACM (2013)
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference
, pp. 169-178
-
-
Husted, N.1
Myers, S.2
Shelat, A.3
Grubbs, P.4
-
13
-
-
79957975354
-
Efficient non-interactive secure computation
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Ishai, Y., Kushilevitz, E., Ostrovsky, R., Prabhakaran, M., Sahai, A.: Efficient non-interactive secure computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 406-425. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 406-425
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Prabhakaran, M.4
Sahai, A.5
-
14
-
-
51849102397
-
Founding cryptography on oblivious transfer - Efficiently
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A.: Founding cryptography on oblivious transfer - efficiently. In:Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 572-591. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 572-591
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
-
15
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
16
-
-
84889076745
-
Billion-gate secure computation with malicious adversaries
-
Kreuter, B., Shelat, A., Shen, C.-H.: Billion-gate secure computation with malicious adversaries. In: USENIX Security, p. 14 (2012)
-
(2012)
USENIX Security
, pp. 14
-
-
Kreuter, B.1
Shelat, A.2
Shen, C.-H.3
-
17
-
-
84884490479
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 1-17. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 1-17
-
-
Lindell, Y.1
-
18
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
19
-
-
79953241261
-
Secure two-party computation via cut-and-choose oblivious transfer
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Secure two-party computation via cut-and-choose oblivious transfer. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 329-346. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 329-346
-
-
Lindell, Y.1
Pinkas, B.2
-
20
-
-
33745843587
-
Efficiency tradeoffs for malicious two-party computation
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Mohassel, P., Franklin, M.K.: Efficiency tradeoffs for malicious two-party computation. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 458-473. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 458-473
-
-
Mohassel, P.1
Franklin, M.K.2
-
21
-
-
84884472737
-
Garbled circuits checking garbled circuits: More efficient and secure two-party computation
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Mohassel, P., Riva, B.: Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 36-53. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 36-53
-
-
Mohassel, P.1
Riva, B.2
-
22
-
-
84865506559
-
A new approach to practical active-secure two-party computation
-
Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
-
Nielsen, J.B., Nordholt, P.S., Orlandi, C., Burra, S.S.: A new approach to practical active-secure two-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 681-700. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 681-700
-
-
Nielsen, J.B.1
Nordholt, P.S.2
Orlandi, C.3
Burra, S.S.4
-
23
-
-
70350634167
-
LEGO for two-party secure computation
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Nielsen, J.B., Orlandi, C.: LEGO for two-party secure computation. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 368-386. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 368-386
-
-
Nielsen, J.B.1
Orlandi, C.2
-
25
-
-
72449131818
-
Secure two-party computation is practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
26
-
-
79958017670
-
Two-output secure computation with malicious adversaries
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
shelat, A., Shen, C.-h.: Two-output secure computation with malicious adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
-
27
-
-
84889073782
-
Fast two-party secure computation with minimal assumptions
-
ACM
-
Shelat, A., Shen, C.-H.: Fast two-party secure computation with minimal assumptions. In: CCS, pp. 523-534. ACM (2013)
-
(2013)
CCS
, pp. 523-534
-
-
Shelat, A.1
Shen, C.-H.2
-
28
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society
-
Yao, A.C.-C.: How to generate and exchange secrets. In: SFCS, pp. 162-167. IEEE Computer Society (1986)
-
(1986)
SFCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|