Secure two-party computation

Results: 88



#Item
21

Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-andChoose with Forge-and-Lose Technique (Slide presentation) Luís T. A. N. Brandão

Add to Reading List

Source URL: webpages.alunos.fc.ul.pt

Language: English - Date: 2014-01-12 23:32:56
    22

    Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

    Add to Reading List

    Source URL: webpages.alunos.fc.ul.pt

    Language: English - Date: 2014-01-15 20:55:04
      23

      GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits Thomas Schneider and Michael Zohner Engineering Cryptographic Protocols Group (ENCRYPTO), European Center for Security and Privacy by Design (EC

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-03-27 20:42:00
        24Cryptography / Secure multi-party computation / Secure two-party computation / Communication complexity / Commitment scheme / Oblivious transfer / Cryptographic protocol / XTR / Transmission Control Protocol

        Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

        Add to Reading List

        Source URL: hunch.net

        Language: English - Date: 2005-03-01 11:04:04
        25

        Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

        Add to Reading List

        Source URL: webpages.alunos.fc.ul.pt

        Language: English - Date: 2014-01-15 21:35:15
          26

          Secure Two-Party Computation over a Z-Channel Paolo Palmieri and Olivier Pereira Universit´e catholique de Louvain UCL Crypto Group, ICTEAM Institute Place du Levant 3, B-1348 Louvain-la-Neuve, Belgium

          Add to Reading List

          Source URL: www.uclouvain.be

          Language: English - Date: 2012-11-06 12:33:24
            27

            Secure Two-Party Computation Faster Secure TwoTwo-Party Computation Using Garbled Circuits Bob’s Genome: ACTG…

            Add to Reading List

            Source URL: mightbeevil.com

            Language: English - Date: 2011-08-12 18:46:27
              28Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

              Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

              Add to Reading List

              Source URL: www.eng.biu.ac.il

              Language: English - Date: 2014-09-04 05:09:56
              29Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

              A New Approach to Practical Active-Secure Two-Party Computation 1 1

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-02-14 09:50:59
              30Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

              An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

              Add to Reading List

              Source URL: www.eng.biu.ac.il

              Language: English - Date: 2014-07-21 08:57:56
              UPDATE