Secure two-party computation in sublinear (amortized) time
暂无分享,去创建一个
Jonathan Katz | Tal Malkin | Yevgeniy Vahlis | Mariana Raykova | Vladimir Kolesnikov | S. Dov Gordon | Fernando Krell | Jonathan Katz | Mariana Raykova | S. D. Gordon | T. Malkin | Yevgeniy Vahlis | V. Kolesnikov | Fernando Krell
[1] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[2] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[3] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[4] Peter Williams,et al. Usable PIR , 2008, NDSS.
[5] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[6] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[7] Michael T. Goodrich,et al. Privacy-preserving group data access via stateless oblivious RAM simulation , 2011, SODA.
[8] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[9] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[10] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[11] Rafail Ostrovsky,et al. On the (in)security of hash-based oblivious RAM and a new balancing scheme , 2012, SODA.
[12] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.
[13] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[14] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[15] Jonathan Katz,et al. On the Security of the Free-XOR Technique , 2012, IACR Cryptol. ePrint Arch..
[16] Rafail Ostrovsky,et al. Private Information Storage , 1996, IACR Cryptol. ePrint Arch..
[17] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[18] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[19] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[20] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[21] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[22] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[23] Rafail Ostrovsky,et al. Private information storage (extended abstract) , 1997, STOC '97.
[24] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[25] Ivan Damgård,et al. Perfectly Secure Oblivious RAM Without Random Oracles , 2011, IACR Cryptol. ePrint Arch..