Whitewash: outsourcing garbled circuit generation for mobile devices
暂无分享,去创建一个
[1] Berry Schoenmakers,et al. A protocol issue for the malicious case of Yao's garbled circuit construction , 2006 .
[2] Matthew K. Franklin,et al. Efficiency Tradeoffs for Malicious Two-Party Computation , 2006, Public Key Cryptography.
[3] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[4] Sean W. Smith,et al. Small, stupid, and scalable: secure computing with faerieplay , 2010, STC '10.
[5] Abhi Shelat,et al. PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation , 2013, USENIX Security Symposium.
[6] Jonathan Katz,et al. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Peter Kulchyski. and , 2015 .
[8] Ivan Damgård,et al. From Passive to Covert Security at Low Cost , 2010, TCC.
[9] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[10] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[11] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[12] Ben Riva,et al. Salus: a system for server-aided secure function evaluation , 2012, CCS.
[13] Patrick Traynor,et al. Secure outsourced garbled circuit evaluation for mobile devices , 2013, J. Comput. Secur..
[14] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[15] Abhi Shelat,et al. Fast two-party secure computation with minimal assumptions , 2013, CCS.
[16] Jonathan Katz,et al. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose , 2013, CRYPTO.
[17] Mohammad Shahriar Rahman,et al. Privacy-Preserving Data Mining in Presence of Covert Adversaries , 2010, ADMA.
[18] Steven Myers,et al. GPU and CPU parallelization of honest-but-curious secure two-party computation , 2013, ACSAC.
[19] Mihir Bellare,et al. Efficient Garbling from a Fixed-Key Blockcipher , 2013, 2013 IEEE Symposium on Security and Privacy.
[20] Mikhail J. Atallah,et al. Securely outsourcing linear algebra computations , 2010, ASIACCS '10.
[21] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[22] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[23] Somesh Jha,et al. Secure function evaluation with ordered binary decision diagrams , 2006, CCS '06.
[24] H.C.A. van Tilborg,et al. Secure and fair two-party computation , 2007 .
[25] Kevin R. B. Butler,et al. Memory-Efficient Garbled Circuit Generation for Mobile Devices , 2012, Financial Cryptography.
[26] Abhi Shelat,et al. Billion-Gate Secure Computation with Malicious Adversaries , 2012, USENIX Security Symposium.
[27] Abhi Shelat,et al. Efficient Secure Computation with Garbled Circuits , 2011, ICISS.
[28] Abhi Shelat,et al. Two-Output Secure Computation with Malicious Adversaries , 2011, EUROCRYPT.
[29] Mariana Raykova,et al. Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[30] Donald Beaver,et al. Server-assisted cryptography , 1998, NSPW '98.
[31] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.
[32] Patrick Traynor,et al. "Mix-in-Place" anonymous networking using secure function evaluation , 2011, ACSAC '11.
[33] Vitaly Shmatikov,et al. Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[34] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[35] Patrick Traynor,et al. For your phone only: custom protocols for efficient secure function evaluation on mobile devices , 2014, Secur. Commun. Networks.
[36] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[37] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries , 2013, CRYPTO.
[38] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.
[39] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[40] Florian Kerschbaum,et al. Collusion-resistant outsourcing of private set intersection , 2012, SAC '12.
[41] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[42] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2011, Journal of Cryptology.