Improved Garbled Circuit: Free XOR Gates and Applications
From MaRDI portal
Publication:3519525
DOI10.1007/978-3-540-70583-3_40zbMath1155.94374MaRDI QIDQ3519525
Thomas Schneider, Vladimir Kolesnikov
Publication date: 19 August 2008
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://encrypto.de/papers/KS08XOR.pdf
94A60: Cryptography
Related Items
Garbled Circuits as Randomized Encodings of Functions: a Primer, Faster Secure Two-Party Computation in the Single-Execution Setting, Non-interactive Secure 2PC in the Offline/Online and Batch Settings, Hashing Garbled Circuits for Free, TinyKeys: a new approach to efficient multi-party computation, Public-Seed Pseudorandom Permutations, Block cipher invariants as eigenvectors of correlation matrices, On the exact round complexity of secure three-party computation, Dispelling myths on superposition attacks: formal security model and attack analyses, Low cost constant round MPC combining BMR and oblivious transfer, SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates, Actively secure garbled circuits with constant communication overhead in the plain model, High-throughput secure three-party computation with an honest majority, Garbling, stacked and staggered. Faster \(k\)-out-of-\(n\) garbled function evaluation, Faster Privacy-Preserving Location Proximity Schemes, Private evaluation of a decision tree based on secret sharing, Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic, Breaking and fixing garbled circuits when a gate has duplicate input wires, On various nonlinearity measures for Boolean functions, Garbling XOR gates ``for free in the standard model, Exploring crypto dark matter: new simple PRF candidates and their applications, Practical attacks against the walnut digital signature scheme, An efficient structural attack on NIST submission DAGS, On compiling Boolean circuits optimized for secure multi-party computation, Multiplicative complexity of vector valued Boolean functions, On multiparty garbling of arithmetic circuits, Free IF: how to omit inactive branches and implement \(\mathcal{S}\)-universal garbled circuit (almost) for free, Concretely efficient large-scale MPC with active security (or tinykeys for tinyot), The multiplicative complexity of 6-variable Boolean functions, Secure two-party computation via cut-and-choose oblivious transfer, Boolean functions with multiplicative complexity 3 and 4, High-performance multi-party computation for binary circuits based on oblivious transfer, Stacked garbling for disjunctive zero-knowledge proofs, \textsf{LogStack}: stacked garbling with \(O(b \log b)\) computation, Large scale, actively secure computation from LPN and free-XOR garbled circuits, Threshold garbled circuits and ad hoc secure computation, On the decision tree complexity of threshold functions, Efficient constant-round MPC with identifiable abort and public verifiability, Stacked garbling. Garbled circuit proportional to longest execution path, Better concrete security for half-gates garbling (in the multi-instance setting), The price of active security in cryptographic protocols, Three halves make a whole? Beating the half-gates lower bound for garbled circuits, Threshold Schnorr with stateless deterministic signing from standard assumptions, Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact, Full-threshold actively-secure multiparty arithmetic circuit garbling, Optimizing registration based encryption, A simple post-quantum non-interactive zero-knowledge proof from garbled circuits, Adaptive security of practical garbling schemes, Differential uniformity and linearity of S-boxes by multiplicative complexity, \textsc{EpiGRAM}: practical garbled RAM, Garbled circuits with sublinear evaluator, Distributed (correlation) samplers: how to remove a trusted dealer in one round, Upper bounds on the multiplicative complexity of symmetric Boolean functions, Efficient and scalable universal circuits, A single shuffle is enough for secure card-based computation of any Boolean circuit, Secure two-party computation in a quantum world, Logic minimization techniques with applications to cryptology, More efficient oblivious transfer extensions, Fast garbling of circuits under standard assumptions, New cryptanalysis of LowMC with algebraic techniques, Network Oblivious Transfer, Linicrypt: A Model for Practical Cryptography, Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials, Encryption Switching Protocols, How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes, Secure Multi-party Computation: Information Flow of Outputs and Game Theory
Cites Work
- A proof of security of Yao's protocol for two-party computation
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
- Universal circuits (Preliminary Report)
- Advances in Cryptology - CRYPTO 2003
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
- A Permutation Network
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item