Back to Results
First PageMeta Content
Computational complexity theory / Logic gates / Circuit complexity / Secure multi-party computation / Levenshtein distance / XOR gate / Boolean circuit / Circuit / Adder / Theoretical computer science / Applied mathematics / Cryptographic protocols


Faster Secure Two-Party Computation Using Garbled Circuits Yan Huang David Evans University of Virginia
Add to Reading List

Document Date: 2011-06-09 13:31:32


Open Document

File Size: 414,79 KB

Share Result on Facebook

Company

Dell / Intel / the AES / /

Currency

pence / /

Event

FDA Phase / /

Facility

University of Maryland / /

IndustryTerm

implementation yields privacy-preserving protocols / oblivious-transfer protocols / cryptographic tools / local-area network / ious transfer protocol / give protocols / encryption-based protocols / Online Time Overall Time / on-line time / on-line computation / delay algorithm / privacy-preserving applications / privacy-preserving protocols / garbled-circuit solutions / hybrid protocol / function-specific protocol / local processing / implement protocols / real-world applications / software attestation / oblivious-transfer protocol / secure computation protocol / secure protocol / circuit computing / dynamic-programming algorithm / generic protocols / online phase / computing / garbled-circuit protocol / online cost / /

Organization

University of Maryland / P2 / P1 / University of Virginia / /

Person

Virginia Jonathan / Yan Huang David / /

Position

circuit evaluator / garbled-circuit evaluator / evaluator / inputs wb / programmer / /

Product

Smith-Waterman / SciFI / Hammingdistance / OT21 / P1 / /

ProgrammingLanguage

Java / /

ProvinceOrState

Maryland / /

PublishedMedium

Fairplay / /

Technology

Levenshteindistance protocol / garbled-circuit protocol / hybrid protocol / second protocol / function-specific protocol / dynamic-programming algorithm / privacy-preserving protocols / secure two-party protocol / Naor-Pinkas protocol / previous privacy-preserving protocols / ious transfer protocol / block cipher / Levenshtein-distance protocol / using Algorithm / implementation yields privacy-preserving protocols / Smith-Waterman algorithm / Levenshtein-distance protocols / Nagle ACK delay algorithm / Hamming-distance protocol / resulting protocol / encryption / oblivious-transfer protocols / OT21 protocol / Cryptography / Java / give protocols / 10000 Algorithm / circuit-based protocol / main protocol / secure protocol / oblivious-transfer protocol / 6 Smith-Waterman The Smith-Waterman algorithm / two-party secure computation protocol / homomorphic-encryption-based protocols / implement protocols / /

URL

http /

SocialTag