Cut-and-Choose for Garbled RAM
暂无分享,去创建一个
[1] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[2] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[3] Carmit Hazay,et al. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model , 2016, IACR Cryptol. ePrint Arch..
[4] Hoeteck Wee,et al. Black-Box Constructions of Two-Party Protocols from One-Way Functions , 2009, TCC.
[5] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[6] Claudio Orlandi,et al. LEGO for Two-Party Secure Computation , 2009, TCC.
[7] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[8] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[9] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[10] Yehuda Lindell,et al. Black-box constructions for secure computation , 2006, STOC '06.
[11] Sanjam Garg,et al. Secure Multiparty RAM Computation in Constant Rounds , 2016, TCC.
[12] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[13] Abhi Shelat,et al. SCORAM: Oblivious RAM for Secure Computation , 2014, IACR Cryptol. ePrint Arch..
[14] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..
[15] Arash Afshar,et al. How to Efficiently Evaluate RAM Programs with Malicious Security , 2014, EUROCRYPT.
[16] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[17] Adi Shamir,et al. Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions , 1999, SIAM J. Comput..
[18] Rafail Ostrovsky,et al. Perfect Non-Interactive Zero Knowledge for NP , 2006, IACR Cryptol. ePrint Arch..
[19] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[20] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[21] Mihir Bellare,et al. Foundations of garbled circuits , 2012, CCS.
[22] Vladimir Kolesnikov,et al. FleXOR: Flexible garbling for XOR gates that beats free-XOR , 2014, IACR Cryptol. ePrint Arch..
[23] Jesper Buus Nielsen,et al. TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation , 2015, IACR Cryptol. ePrint Arch..
[24] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[25] Rafail Ostrovsky,et al. Constructing Non-malleable Commitments: A Black-Box Approach , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[26] Donald Beaver,et al. Correlated pseudorandomness and the complexity of private computations , 1996, STOC '96.
[27] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[28] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[29] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[30] Hoeteck Wee,et al. Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[31] Silvio Micali,et al. The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.
[32] Rafail Ostrovsky,et al. Black-Box Garbled RAM , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[33] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[34] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[35] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[36] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[37] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[38] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[39] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[40] Jesper Buus Nielsen,et al. On the Complexity of Additively Homomorphic UC Commitments , 2016, TCC.
[41] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[42] Stephen A. Cook,et al. Time-bounded random access machines , 1972, J. Comput. Syst. Sci..
[43] Claudio Orlandi,et al. MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions , 2013, EUROCRYPT.
[44] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[45] Rafail Ostrovsky,et al. Garbled RAM From One-Way Functions , 2015, STOC.
[46] Rafail Ostrovsky,et al. Black-box non-black-box zero knowledge , 2014, IACR Cryptol. ePrint Arch..
[47] Russell Impagliazzo,et al. Limits on the provable consequences of one-way permutations , 1988, STOC '89.
[48] David Evans,et al. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates , 2015, EUROCRYPT.
[49] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[50] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[51] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[52] Mihir Bellare,et al. Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing , 2012, ASIACRYPT.