A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Modes of Operation Suitable for Computing on Encrypted Data
2017
IACR Transactions on Symmetric Cryptology
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to
doi:10.46586/tosc.v2017.i3.294-324
fatcat:ums2prp45jhkpnulf2grrbfmwq