On the leakage of corrupted garbled circuits
From MaRDI portal
Publication:1616633
Recommendations
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Fast cut-and-choose-based protocols for malicious and covert adversaries
- Two-output secure computation with malicious adversaries
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- Amortizing Garbled Circuits
Cited in
(7)- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- Enforcing input correctness via certification in garbled circuit evaluation
- Parallel Repetition for Leakage Resilience Amplification Revisited
- Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
- Amortizing Garbled Circuits
- Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
This page was built for publication: On the leakage of corrupted garbled circuits
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1616633)