Fast cut-and-choose-based protocols for malicious and covert adversaries
From MaRDI portal
(Redirected from Publication:290398)
Recommendations
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Secure two-party computation via cut-and-choose oblivious transfer
- Secure two-party computation via cut-and-choose oblivious transfer
- Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
- Two-output secure computation with malicious adversaries
Cites work
- scientific article; zbMATH DE number 176562 (Why is no real title available?)
- scientific article; zbMATH DE number 503243 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A new approach to practical active-secure two-party computation
- A proof of security of Yao's protocol for two-party computation
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology – CRYPTO 2004
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Efficient Two-Party Secure Computation on Committed Inputs
- Efficient secure two-party computation using symmetric cut-and-choose
- Efficient secure two-party protocols. Techniques and constructions
- Faster maliciously secure two-party computation using the GPU
- Foundations of Cryptography
- Founding Cryptography on Oblivious Transfer – Efficiently
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- LEGO for Two-Party Secure Computation
- Multiparty Computation from Somewhat Homomorphic Encryption
- Multiparty computation for dishonest majority: from passive to active security at low cost
- Practical Two-Party Computation Based on the Conditional Gate
- Secure Arithmetic Computation with No Honest Majority
- Secure two-party computation via cut-and-choose oblivious transfer
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Security and composition of multiparty cryptographic protocols
- Semi-homomorphic encryption and multiparty computation
- The IPS compiler: optimizations, variants and concrete efficiency
- Two-output secure computation with malicious adversaries
Cited in
(29)- Efficient secure two-party computation using symmetric cut-and-choose
- Garbled circuits checking garbled circuits: more efficient and secure two-party computation
- Secure two-party computation via cut-and-choose oblivious transfer
- Faster maliciously secure two-party computation using the GPU
- Cross and clean: amortized garbled circuits with constant overhead
- JIMU: faster LEGO-based secure computation using additive homomorphic hashes
- MiniLEGO: efficient secure two-party computation from general assumptions
- On cut-and-choose oblivious transfer and its variants
- Efficient Two-Party Secure Computation on Committed Inputs
- Actively secure garbled circuits with constant communication overhead in the plain model
- Oblivious transfer based on single-qubit rotations
- Scalable multi-party private set-intersection
- Fast garbling of circuits under standard assumptions
- Efficient three-party computation from cut-and-choose
- Geometry-based garbled circuits relying solely on one evaluation algorithm under standard assumption
- On the leakage of corrupted garbled circuits
- Mixed-technique multi-party computations composed of two-party computations
- Efficient covert two-party computation
- Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
- Toward malicious constant-rate 2PC via arithmetic garbling
- Parallel coin-tossing and constant-round secure two-party computation
- Two-output secure computation with malicious adversaries
- Faster secure two-party computation in the single-execution setting
- The IPS compiler: optimizations, variants and concrete efficiency
- scientific article; zbMATH DE number 1842491 (Why is no real title available?)
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Secure two-party computation via cut-and-choose oblivious transfer
- LEGO for Two-Party Secure Computation
- Asymptotically quasi-optimal cryptography
This page was built for publication: Fast cut-and-choose-based protocols for malicious and covert adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q290398)