Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
From MaRDI portal
Publication:3540034
DOI10.1007/978-3-540-85855-3_2zbMath1180.68152OpenAlexW1494138594MaRDI QIDQ3540034
Benny Pinkas, Yehuda Lindell, Nigel P. Smart
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85855-3_2
Related Items (10)
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces ⋮ Garbling XOR gates ``for free in the standard model ⋮ Adaptive security of practical garbling schemes ⋮ Asymptotically quasi-optimal cryptography ⋮ Fast garbling of circuits under standard assumptions ⋮ Breaking and fixing garbled circuits when a gate has duplicate input wires ⋮ Recursive hiding of biometrics-based secret sharing scheme using adversary structure ⋮ High-performance multi-party computation for binary circuits based on oblivious transfer ⋮ Garbled Circuits as Randomized Encodings of Functions: a Primer ⋮ Faster Secure Two-Party Computation in the Single-Execution Setting
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security and composition of multiparty cryptographic protocols
- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
- Secure Multiparty Computation Goes Live
- Foundations of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Revisiting the Efficiency of Malicious Two-Party Computation
- Efficient Two-Party Secure Computation on Committed Inputs
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Public Key Cryptography - PKC 2006
This page was built for publication: Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries