Secure two-party computation

Results: 88



#Item
61Genetics / Biology / DNA / Secure multi-party computation / Genetic testing / Boolean circuit / Parental testing / DNA profiling / Actor model / Cryptographic protocols / Applied genetics / Cryptography

Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation Marina Blanton and Fattaneh Bayatbabolghani Department of Computer Science and Engineering University of Notre Dame mbl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 22:08:08
62Key management / Zero-knowledge proof / Secure multi-party computation / Standard model / Secure two-party computation / Alice and Bob / IP / Trusted third party / Public key infrastructure / Cryptography / Cryptographic protocols / Public-key cryptography

Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 09:16:36
63Communications protocol / Secure multi-party computation / Common reference string model / Secure two-party computation / Commitment scheme / Security parameter / Universal composability / Cryptographic protocols / Data / Information

Obtaining Universally Composable Security: Towards the Bare Bones of Trust∗ Ran Canetti† December 15, 2007 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-18 22:27:46
64Mathematical logic / XOR gate / OR gate / Commitment scheme / Boolean circuit / AND gate / Exclusive or / Verifiable computing / Logic gates / Theoretical computer science / Mathematics

TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, and Roberto Trifiletti ???

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 01:46:16
65Communications protocol / Secure two-party computation / Oblivious transfer / Secure multi-party computation / Transmission Control Protocol / Two-phase commit protocol / Public-key cryptography / Circuit / Cryptography / Cryptographic protocols / Commitment scheme

Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 05:51:56
66Secure multi-party computation / Secure two-party computation / Cryptography / Homomorphic encryption / Intelligence Advanced Research Projects Activity / Cryptographic primitive / Communications protocol / Cryptographic protocols / Data / Information

Microsoft Word - RFI SPAR-MPC[removed]docx

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
67Oblivious transfer / Models of computation / Randomness / Random oracle / Oracle machine / Advantage / Optimal asymmetric encryption padding / Secure two-party computation / Random function / Cryptography / Cryptographic protocols / Cryptographic hash functions

Extending Oblivious Transfers Efficiently Yuval Ishai1 , Joe Kilian2 , Kobbi Nissim2? , and Erez Petrank1?? 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
68Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
69Secure two-party computation / Security parameter / Valuation / Mathematics / Applied mathematics / Cryptographic protocols / Secure multi-party computation / Universal composability

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay∗ Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-03 15:33:45
70Secure two-party computation / Communications protocol / Secret sharing / Transmission Control Protocol / Information-theoretic security / IP / Computational complexity theory / Zero-knowledge proof / PP / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Multiparty Protocols via Log-Depth Threshold Formulae Gil Cohen∗ Ivan Bjerre Damg˚ ard† Yuval Ishai‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-08-07 04:07:04
UPDATE