Efficient Maliciously Secure Multiparty Computation for RAM
暂无分享,去创建一个
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[3] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[4] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[5] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[6] Claudio Orlandi,et al. LEGO for Two-Party Secure Computation , 2009, TCC.
[7] Marcel Keller,et al. The Oblivious Machine - or: How to Put the C into MPC , 2017, IACR Cryptol. ePrint Arch..
[8] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.
[9] Rafail Ostrovsky,et al. Black-Box Garbled RAM , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[10] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Yehuda Lindell,et al. Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ , 2015, IACR Cryptol. ePrint Arch..
[12] Carmit Hazay,et al. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model , 2019, Journal of Cryptology.
[13] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[14] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[15] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[16] Eran Omri,et al. Efficient Scalable Constant-Round MPC via Garbled Circuits , 2017, IACR Cryptol. ePrint Arch..
[17] Abhi Shelat,et al. Scaling ORAM for Secure Computation , 2017, IACR Cryptol. ePrint Arch..
[18] Yehuda Lindell,et al. Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries , 2015, IACR Cryptol. ePrint Arch..
[19] Eran Omri,et al. Optimizing Semi-Honest Secure Multiparty Computation for the Internet , 2016, IACR Cryptol. ePrint Arch..
[20] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[21] Payman Mohassel,et al. Sublinear Zero-Knowledge Arguments for RAM Programs , 2017, EUROCRYPT.
[22] Payman Mohassel,et al. Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost , 2015, CRYPTO.
[23] Jonathan Katz,et al. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation , 2017, CCS.
[24] Marcel Keller,et al. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer , 2016, IACR Cryptol. ePrint Arch..
[25] Jonathan Katz,et al. Secure Computation of MIPS Machine Code , 2016, ESORICS.
[26] Claudio Orlandi,et al. MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions , 2013, EUROCRYPT.
[27] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[28] Sanjam Garg,et al. Secure Multiparty RAM Computation in Constant Rounds , 2016, TCC.
[29] Ran Canetti,et al. Fully Succinct Garbled RAM , 2016, ITCS.
[30] Arash Afshar,et al. How to Efficiently Evaluate RAM Programs with Malicious Security , 2014, EUROCRYPT.
[31] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[32] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[33] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[34] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[35] Rafail Ostrovsky,et al. Garbled RAM From One-Way Functions , 2015, STOC.
[36] Yehuda Lindell,et al. More Efficient Constant-Round Multi-Party Computation from BMR and SHE , 2016, IACR Cryptol. ePrint Arch..
[37] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[38] Alex J. Malozemoff,et al. Faster Secure Two-Party Computation in the Single-Execution Setting , 2017, EUROCRYPT.
[39] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.