Filters








2,108 Hits in 6.1 sec

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model [chapter]

Carmit Hazay, Avishay Yanai
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work we design the first constant round maliciously secure two-party protocol in the RAM model. Our starting point is the garbled RAM construction of Gentry et al.  ...  The random-access memory (RAM) model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms.  ...  Constant round 2PC in the RAM model.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_20">doi:10.1007/978-3-662-53641-4_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/anau5qz6qbgsbanimrzfrwovei">fatcat:anau5qz6qbgsbanimrzfrwovei</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160909064118/http://eprint.iacr.org:80/2016/805.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/71/807130d9b397aebcb094d9d506cfa181f6aa96a5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Multiparty RAM Computation in Constant Rounds [chapter]

Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work, we consider the multi-party case and obtain the following results: -Semi-honest model : We present a constant-round black-box secure computation protocol for RAM programs.  ...  -Malicious model : Next, we show how to extend our semi-honest results to the malicious setting, while ensuring that the new protocol is still constant-round and black-box in nature.  ...  Traditionally, secure computation on RAM programs is thus studied in two models.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_19">doi:10.1007/978-3-662-53641-4_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bpeqitkgqjdlraijgclxx62hdy">fatcat:bpeqitkgqjdlraijgclxx62hdy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710235244/http://eprint.iacr.org/2016/815.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/ae/dfae3d4a34565f52a947247aec6b923281733e39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53641-4_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Recent Results in Scalable Multi-Party Computation [chapter]

Jared Saia, Mahdi Zamani
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Secure multi-party computation (MPC) allows multiple parties to compute a known function over inputs held by each party, without any party having to reveal its private input.  ...  Unfortunately, traditional MPC algorithms do not scale well to large numbers of parties. In this paper, we describe several recent MPC algorithms that are designed to handle large networks.  ...  Acknowledgments The authors would like to acknowledge supports from NSF under grants CCF-1320994, CCR-0313160, and CAREER Award 644058.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46078-8_3">doi:10.1007/978-3-662-46078-8_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/37fhqleqvzdarox23nnlnl3gyq">fatcat:37fhqleqvzdarox23nnlnl3gyq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022132237/http://eprint.iacr.org/2014/872.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/da/ebdae51d39d6311e2755c164613646b4c890d6ec.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46078-8_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Verifiable Oblivious Storage [chapter]

Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The main challenge, however, is how to ensure security when the server is malicious, and may arbitrarily deviate from the prescribed computation. Generic ORAM-to-VOS compiler in the malicious model.  ...  For example, we know from prior work that RAM-model secure multi-party computation [25] and Dynamic Proofs of Retrievability [9] can be built using ORAM as a building block.  ...  the U.S.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54631-0_8">doi:10.1007/978-3-642-54631-0_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i36n6hbozjhztacet4yxn42mte">fatcat:i36n6hbozjhztacet4yxn42mte</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705204915/https://eprint.iacr.org/2014/153.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/71/6d714dad0d2903350cd5153c59a2ac4f68672232.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54631-0_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs [chapter]

Elette Boyle, Kai-Min Chung, Rafael Pass
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
More specifically, we demonstrate load-balanced, statistically secure computation protocols for computing Parallel RAM (PRAM) programs, handling (1/3 − ) fraction malicious players, while preserving up  ...  to polylogarithmic factors the computation, parallel time, and memory complexities of the PRAM program, aside from a one-time execution of a broadcast protocol per party.  ...  We model parties as (parallel) RAM machines.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48000-7_36">doi:10.1007/978-3-662-48000-7_36</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bzvrj2j435ahffuaptnyfew32q">fatcat:bzvrj2j435ahffuaptnyfew32q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200326084154/https://link.springer.com/content/pdf/10.1007%2F978-3-662-48000-7_36.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/2a/d92aa34f7a9114db30a8cd4cf45a72ac24460630.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48000-7_36"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Distance Lower Bounding [chapter]

Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We motivate this problem through a number of application scenarios, and model security against distance fraud (DF), Man-in-the-Middle (MiM), and collusion fraud (CF) attacks.  ...  We propose approaches to the construction of secure protocols under reasonable assumptions, and give detailed design of our DLB protocol and prove its security using the above model.  ...  distance bounding protocol and gives a formal security model in multi-party setting; and [4] provides a security model in terms of resistance to three general classes of attacks that include other known  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-21966-0_7">doi:10.1007/978-3-319-21966-0_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lgnmluuctjat3ecjqqnh6utxvm">fatcat:lgnmluuctjat3ecjqqnh6utxvm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318114739/http://eprint.iacr.org/2014/888.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/09/52096cbe370665c5bd707638b548736e4a2512d2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-21966-0_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Founding Cryptography on Tamper-Proof Hardware Tokens [chapter]

Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We show that the following tasks, which cannot be realized in the "plain" model, become feasible if the parties are allowed to generate and exchange tamper-proof hardware tokens.  ...  In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM.  ...  We thank Jürg Wullschleger for pointing out the relevance of [27] and for other helpful comments. We thank Guy Rothblum for useful discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_19">doi:10.1007/978-3-642-11799-2_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wbydcvt2gjhw3jjsi22x3dtc7m">fatcat:wbydcvt2gjhw3jjsi22x3dtc7m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727092116/https://link.springer.com/content/pdf/10.1007%2F978-3-642-11799-2_19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/73/787375fd22519de6d21b07d31336216825bab89b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
<span title="2019-04-02">2019</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits.  ...  The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations.  ...  This work is supported in part by the US National Science Foundation under grant CNS-1540217.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/1368905">doi:10.1155/2019/1368905</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/izynm6msrvehfa3ghkw7tykk34">fatcat:izynm6msrvehfa3ghkw7tykk34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503153550/http://downloads.hindawi.com/journals/scn/2019/1368905.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fd/0e/fd0eacff6b5aba39408043d2f83c3b1901f4cf56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/1368905"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Systematizing Secure Computation for Research and Decision Support [chapter]

Jason Perry, Debayan Gupta, Joan Feigenbaum, Rebecca N. Wright
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We propose a framework for organizing and classifying research results in the active field of secure multiparty computation (MPC).  ...  We have classified a large number of MPC protocols on these axes and developed an interactive tool for exploring the problem space of secure computation.  ...  The views and conclusions herein are those of the authors and should not be interpreted as necessarily representing the office policies or endorsements, either expressed or implied, of DARPA or the U.S  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-10879-7_22">doi:10.1007/978-3-319-10879-7_22</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mbmbehaxtnhipoktng5ffxpjvq">fatcat:mbmbehaxtnhipoktng5ffxpjvq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150608131740/http://paul.rutgers.edu/~jasperry/scn14.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/1e/911e4254f11041d81e78a094a0c13e6d2c19c9ce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-10879-7_22"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions [chapter]

Payman Mohassel, Salman Niksefat
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In addition to being one-round and requiring a small amount of work by the client (in the RAM model), our protocols only require a small number of exponentiations (independent of the server's input) by  ...  We prove our protocols secure (private) against malicious adversaries in the standard ideal/real world simulation-based paradigm.  ...  When measuring client's computation in our protocols, we work in the RAM model of computation where lookups can be performed in constant time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-32946-3_20">doi:10.1007/978-3-642-32946-3_20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e54jubylufc5vf3y47iqee6gqi">fatcat:e54jubylufc5vf3y47iqee6gqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829090618/http://pages.cpsc.ucalgary.ca/~pmohasse/odp.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/7e/987e3311b824b5c1148086ebe016d2846ba411b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-32946-3_20"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

How to Garble RAM Programs? [chapter]

Steve Lu, Rafail Ostrovsky
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Assuming solely the existence of one-way functions, we show how to construct Garbled RAM Programs (GRAM) where its size only depends on fixed polynomial in the security parameter times the program running  ...  We stress that we avoid converting the RAM programs into circuits.  ...  Acknowledgements We thank Oded Goldreich and Daniel Wichs for very helpful discussions and the anonymous reviewers for their comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-38348-9_42">doi:10.1007/978-3-642-38348-9_42</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ykszm343lngqjmyffbjnue5oym">fatcat:ykszm343lngqjmyffbjnue5oym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022135626/http://eprint.iacr.org/2012/601.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/56/db5647a233f5657913e669ce11d02aafb3fb8fa1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-38348-9_42"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications

Donghang Lu, Albert Yu, Aniket Kate, Hemanta Maji
<span title="2021-11-20">2021</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/feed3pdnijhbnm6huwkkxavghy" style="color: black;">Proceedings on Privacy Enhancing Technologies</a> </i> &nbsp;
For the decision tree evaluation problem, we demonstrate the feasibility of evaluating high-depth decision tree models in a general n-party setting.  ...  We present Polymath, a constant-round secure computation protocol suite for the secure evaluation of (multi-variate) polynomials of scalars and matrices, functionalities essential to numerous data-processing  ...  This work has been partially supported by a grant from the MITRE corporation, the IARPA HEC-TOR program, and the National Science Foundation under grant CNS-1719196.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/popets-2022-0020">doi:10.2478/popets-2022-0020</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/77tlblswjbaxzppdqw77tzle7e">fatcat:77tlblswjbaxzppdqw77tzle7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220115013055/https://www.sciendo.com/pdf/10.2478/popets-2022-0020" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/90/0e9034566e9f04a3a5ae36480d1e29afa2691f5a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2478/popets-2022-0020"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Secure Computation from Millionaire [chapter]

Abhi Shelat, Muthuramakrishnan Venkitasubramaniam
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In special cases such as median, we also show how to achieve malicious security.  ...  The standard method for designing a secure computation protocol for function f first transforms f into either a circuit or a RAM program and then applies a generic secure computation protocol that either  ...  Alternatively, Ostrovsky and Shoup [20] demonstrated a way to construct two-party secure computation protocols for RAM programs by first translating the RAM program into a sequence of oblivious RAM  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48797-6_30">doi:10.1007/978-3-662-48797-6_30</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/u3tru4bgsfht7inm5zya3peahu">fatcat:u3tru4bgsfht7inm5zya3peahu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161030045901/http://www.cs.rochester.edu/u/muthuv/compare.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/17/2317d5dff64480ec9d925d375b0edd79cc0c80c1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-48797-6_30"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

FairplayMP

Assaf Ben-David, Noam Nisan, Benny Pinkas
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 15th ACM conference on Computer and communications security - CCS &#39;08</a> </i> &nbsp;
FairplayMP supplements the Fairplay system [16], which supported secure computation between two parties.  ...  The underlying protocol of FairplayMP is the Beaver-Micali-Rogaway (BMR) protocol which runs in a constant number of communication rounds (eight rounds in our implementation).  ...  Given this difficulty in achieving security against malicious adversaries, the current version of FairplayMP handles only the semi-honest case. Constant round protocols.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1455770.1455804">doi:10.1145/1455770.1455804</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/Ben-DavidNP08.html">dblp:conf/ccs/Ben-DavidNP08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/epuincxvobh2jixa3ri4uybixm">fatcat:epuincxvobh2jixa3ri4uybixm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131008021639/http://w3.cs.huji.ac.il/~noam/FairplayMP.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/63/bb63c68855d42c95623ed9362d0853ea1d4cc858.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1455770.1455804"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure Multi-party Shuffling [chapter]

Mahnush Movahedi, Jared Saia, Mahdi Zamani
<span title="">2015</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret.  ...  In this paper, we propose an unconditionally-secure protocol for multi-party shuffling that scales well with the number of parties and is load-balanced.  ...  Acknowledgment The authors would like to acknowledge supports from NSF under grants CCF-1320994, CCR-0313160, and CAREER Award 644058.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-25258-2_32">doi:10.1007/978-3-319-25258-2_32</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ger7t4s6h5avjnnbeefg7sfv3i">fatcat:ger7t4s6h5avjnnbeefg7sfv3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022135341/http://eprint.iacr.org/2015/664.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/81/46/81469280a21b24ac1da6a276a235761ae5a30f5d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-25258-2_32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 2,108 results