Secure Two-Party Computation Is Practical

From MaRDI portal
Publication:3650696

DOI10.1007/978-3-642-10366-7_15zbMath1267.94091OpenAlexW1521253015MaRDI QIDQ3650696

Stephen C. Williams, Thomas Schneider, Benny Pinkas, Nigel P. Smart

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_15




Related Items (35)

Three halves make a whole? Beating the half-gates lower bound for garbled circuitsSecure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line MarketplacesMPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applicationsGarbling XOR gates ``for free in the standard modelConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelMore Efficient Constant-Round Multi-party Computation from BMR and SHEFull-threshold actively-secure multiparty arithmetic circuit garblingAdaptive security of practical garbling schemesGarbled circuits with sublinear evaluatorFast garbling of circuits under standard assumptionsSecure two-party computation via cut-and-choose oblivious transferGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionHow to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling SchemesPrivacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attackBreaking and fixing garbled circuits when a gate has duplicate input wiresCrowd verifiable zero-knowledge and end-to-end verifiable multiparty computationFully homomorphic SIMD operationsOn multiparty garbling of arithmetic circuitsSecure two-party computation in a quantum worldEfficient, actively secure MPC with a dishonest majority: a surveyPrivacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networksConstant-round maliciously secure two-party computation in the RAM modelBlock cipher invariants as eigenvectors of correlation matricesHigh-performance multi-party computation for binary circuits based on oblivious transferOn the power of secure two-party computationOn the Power of Secure Two-Party ComputationLinicrypt: A Model for Practical CryptographyEfficient constant-round multi-party computation combining BMR and SPDZSecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient UpdatesStacked garbling. Garbled circuit proportional to longest execution pathBetter concrete security for half-gates garbling (in the multi-instance setting)Garbled Circuits as Randomized Encodings of Functions: a PrimerFaster Secure Two-Party Computation in the Single-Execution SettingNon-interactive Secure 2PC in the Offline/Online and Batch SettingsHashing Garbled Circuits for Free




This page was built for publication: Secure Two-Party Computation Is Practical