Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries

From MaRDI portal
Publication:2849382

DOI10.1007/978-3-642-40084-1_1zbMath1316.94082OpenAlexW2246792095MaRDI QIDQ2849382

Yehuda Lindell

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_1




Related Items (24)

Automata evaluation and text search protocols with simulation-based securityRound optimal black-box ``commit-and-proveConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelMore Efficient Constant-Round Multi-party Computation from BMR and SHECross and Clean: Amortized Garbled Circuits with Constant OverheadImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingEnforcing input correctness via certification in garbled circuit evaluationGeneralizing Efficient Multiparty ComputationHow to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling SchemesReactive Garbling: Foundation, Instantiation, ApplicationEfficient RSA key generation and threshold Paillier in the two-party settingEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costTri-state circuits. A circuit model that captures RAMOblivious polynomial evaluation and secure set-intersection from algebraic PRFsImproved Private Set Intersection Against Malicious AdversariesConstant-round maliciously secure two-party computation in the RAM modelOn the exact round complexity of secure three-party computationOn Garbling Schemes with and Without PrivacyNetwork Oblivious TransferEfficient constant-round multi-party computation combining BMR and SPDZBetter concrete security for half-gates garbling (in the multi-instance setting)Faster Secure Two-Party Computation in the Single-Execution SettingNon-interactive Secure 2PC in the Offline/Online and Batch SettingsHashing Garbled Circuits for Free






This page was built for publication: Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries