Secure two-party computation

Results: 88



#Item
1

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
    2

    Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALY

    Add to Reading List

    Source URL: web.cs.ucla.edu

    Language: English - Date: 2018-05-09 14:03:00
      3

      LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, Denmark

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2008-10-03 03:53:01
        4

        An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2008-01-30 02:51:31
          5

          Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-10-29 04:46:48
            6Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

            Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

            Add to Reading List

            Source URL: work.debayangupta.com

            Language: English - Date: 2014-06-25 08:00:47
            7Cryptography / Mathematical analysis / Quantum complexity theory / Computational complexity theory / Functions and mappings / Secure multi-party computation / Communication complexity / Secure two-party computation / Limit of a function / Cryptographic protocol / Pi / PP

            Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

            Add to Reading List

            Source URL: cs-www.cs.yale.edu

            Language: English - Date: 2006-09-25 10:55:42
            8Cryptography / Secure multi-party computation / Secure two-party computation / Ciphertext indistinguishability / Consensus / Secret sharing / IP / Control theory

            MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

            Add to Reading List

            Source URL: www.cs.rpi.edu

            Language: English - Date: 2011-02-19 14:29:40
            9Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

            ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

            Add to Reading List

            Source URL: www.crypto.ethz.ch

            Language: English - Date: 2015-04-20 05:08:37
            10Cryptography / Cryptographic hash functions / Information theory / Secure multi-party computation / Transmission Control Protocol / Bandwidth / SHA-1 / Internet protocol suite / Computational complexity theory / Network performance

            Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

            Add to Reading List

            Source URL: www.fkerschbaum.org

            Language: English - Date: 2011-09-10 05:30:51
            UPDATE