Efficient Two-Party Secure Computation on Committed Inputs

From MaRDI portal
Publication:5429385

DOI10.1007/978-3-540-72540-4_6zbMath1141.94358OpenAlexW2153235002MaRDI QIDQ5429385

Stanislaw Jarecki, Vitaly Shmatikov

Publication date: 29 November 2007

Published in: Advances in Cryptology - EUROCRYPT 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-72540-4_6




Related Items (23)

Efficient set intersection with simulation-based securityEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingFast cut-and-choose-based protocols for malicious and covert adversariesConstant-Round Maliciously Secure Two-Party Computation in the RAM ModelCross and Clean: Amortized Garbled Circuits with Constant OverheadRate-limited secure function evaluationA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementSecure two-party computation via cut-and-choose oblivious transferGeneralizing Efficient Multiparty ComputationEfficient RSA key generation and threshold Paillier in the two-party settingImplementing Two-Party Computation Efficiently with Security Against Malicious AdversariesEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSRate-Limited Secure Function Evaluation: Definitions and ConstructionsActively secure garbled circuits with constant communication overhead in the plain modelRemoving the Strong RSA Assumption from Arguments over the IntegersConstant-round maliciously secure two-party computation in the RAM modelSecurity against covert adversaries: Efficient protocols for realistic adversariesFair Traceable Multi-Group SignaturesSecure computation of the median (and other elements of specified ranks)Compact E-Cash and Simulatable VRFs RevisitedEfficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving CredentialsSecure linear system computation in the presence of malicious adversariesAn efficient protocol for secure two-party computation in the presence of malicious adversaries




This page was built for publication: Efficient Two-Party Secure Computation on Committed Inputs