How to circumvent the two-ciphertext lower bound for linear garbling schemes
From MaRDI portal
Publication:2953802
Recommendations
- Three halves make a whole? Beating the half-gates lower bound for garbled circuits
- Two halves make a whole: reducing data transfer in garbled circuits using half gates
- On garbling schemes with and without privacy
- Improved Garbled Circuit: Free XOR Gates and Applications
- Improvements for gate-hiding garbled circuits
Cites work
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
- Amortizing Garbled Circuits
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Constant-round private function evaluation with linear complexity
- Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
- Efficient secure two-party computation using symmetric cut-and-choose
- Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
- Fast garbling of circuits under standard assumptions
- Flexor: Flexible garbling for XOR gates that beats free-XOR
- Garbling scheme for formulas with constant size of garbled gates
- Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
- Improved Garbled Circuit: Free XOR Gates and Applications
- LEGO for Two-Party Secure Computation
- MiniLEGO: efficient secure two-party computation from general assumptions
- Secure two-party computation is practical
- Secure two-party computation via cut-and-choose oblivious transfer
- Secure two-party computation with reusable bit-commitments, via a cut-and-choose with forge-and-lose technique (extended abstract)
- Two halves make a whole: reducing data transfer in garbled circuits using half gates
- Two-output secure computation with malicious adversaries
- Universal circuits (Preliminary Report)
Cited in
(7)- On garbling schemes with and without privacy
- A new approach to garbled circuits
- Three halves make a whole? Beating the half-gates lower bound for garbled circuits
- Garbling scheme for formulas with constant size of garbled gates
- Fast garbling of circuits over 3-valued logic
- Two halves make a whole: reducing data transfer in garbled circuits using half gates
- Garbled circuits with sublinear evaluator
This page was built for publication: How to circumvent the two-ciphertext lower bound for linear garbling schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2953802)