This site contains annotated bibliography entries of research papers in practical secure computation, with the goal of being a resource for new and old researchers interested in the topic. Initially, the site will focus on two-party computation using garbled circuits and cut-and-choose techniques. See this page for more information about this project.
Disclaimer: The current selection of papers is somewhat arbitrary, so do not use a paper's presence/absence on this site as any indicator of that paper's importance. The site is very much a work in progress, and writing bibliography entries is somewhat of a "spare time" activity for its maintainer! There are perhaps hundreds of great papers that are egregiously missing from the site and should be included. In the mean time, I would gladly accept corrections of factual errors, as well as contributed bibliography entries! Check out the guidelines for bibliography entries.
View all 40 papers:
View all papers, by category, author names, publication date, recently added, recently updated.
Quick list (tooltips contain title / author):
[AL10] [ALSZ13] [AO12] [B13] [BHKR13] [BHR12] [CKKZ12?] [FJNOO13] [GKKKMRV12] [HKE12] [HL10] [HSEKS11] [IKNP03] [IKOS07] [JKO13] [K05] [KK12] [KK13] [KMR14] [KS06] [KS06b] [KS08] [KS08b] [KSS12] [L13] [LP07] [LP08] [LP09] [LP12] [LPS08] [MF06] [MNPS04] [MR13] [PSSW09] [S12] [SS11] [SS13] [SZ13] [V76] [Y86]
Categories in the database:
Circuit constructions & optimizations: 2 papers»
Cut-and-choose mechanisms: 9 papers»
Garbling methods: 10 papers»
Implementations: 2 papers»
Oblivious transfer extension: 3 papers»
Protocol paradigms: 4 papers»
Reference works: 3 papers»
Security models: 5 papers»
Special-purpose protocols: 1 papers»
Glossary terms (view all definitions):
- Home page
- All papers, by:
- .. category
- .. author names
- .. publication date
- .. recently added
- .. recently updated
- Glossary
- About
- Just getting started in MPC?
- Guidelines
- Todo List
Search Papers
Bibliography Categories