More efficient oblivious transfer and extensions for faster secure computation
暂无分享,去创建一个
Yehuda Lindell | Michael Zohner | Gilad Asharov | Thomas Schneider | Yehuda Lindell | T. Schneider | Gilad Asharov | Michael Zohner
[1] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[2] Florian Kerschbaum,et al. Automatically optimizing secure computation , 2011, CCS '11.
[3] Michael Zohner,et al. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits , 2013, Financial Cryptography.
[4] Michael K. Reiter,et al. Automatic generation of two-party computations , 2003, CCS '03.
[5] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[8] Joan Boyar,et al. The Exact Multiplicative Complexity of the Hamming Weight Function , 2005, Electron. Colloquium Comput. Complex..
[9] Adi Shamir,et al. The cryptographic security of truncated linearly related variables , 1985, STOC '85.
[10] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[11] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[12] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[13] Helmut Veith,et al. Secure two-party computations in ANSI C , 2012, CCS.
[14] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[15] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[16] Florian Kerschbaum,et al. Demo: secure computation in JavaScript , 2011, CCS '11.
[17] Yan Huang,et al. Privacy-Preserving Applications on Smartphones , 2011, HotSec.
[18] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[19] Donald Beaver,et al. Correlated pseudorandomness and the complexity of private computations , 1996, STOC '96.
[20] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[21] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[24] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[25] Jonathan Katz,et al. Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces , 2012, CT-RSA.
[26] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[27] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.
[28] Mikhail J. Atallah,et al. Privacy-preserving credit checking , 2005, EC '05.
[29] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[30] Abhi Shelat,et al. Billion-Gate Secure Computation with Malicious Adversaries , 2012, USENIX Security Symposium.
[31] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[32] Yehuda Lindell,et al. SCAPI: The Secure Computation Application Programming Interface , 2012, IACR Cryptol. ePrint Arch..
[33] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[34] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[35] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[36] Vladimir Kolesnikov,et al. Improved OT Extension for Transferring Short Secrets , 2013, CRYPTO.
[37] Jesper Buus Nielsen,et al. Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free , 2007, IACR Cryptol. ePrint Arch..
[38] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[39] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[40] Vitaly Shmatikov,et al. Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[41] S. Rajsbaum. Foundations of Cryptography , 2014 .
[42] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[43] Benny Pinkas,et al. Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.
[44] Thomas Schneider,et al. Faster secure two-party computation with less memory , 2013, ASIA CCS '13.
[45] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[46] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[47] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[48] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[49] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[50] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[51] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[52] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[53] Mihir Bellare,et al. "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case , 1997, CRYPTO.
[54] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[55] J. O. Eklundh,et al. A Fast Computer Method for Matrix Transposing , 1972, IEEE Transactions on Computers.
[56] Jonathan Katz,et al. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution , 2012, 2012 IEEE Symposium on Security and Privacy.
[57] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[58] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..