Database contains 40 papers:
[AL10] Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. J Cryptology 2010 [pdf] [bibtex]
Summary: Defines a new model of "covert security" in which honest parties are guaranteed to detect cheating parties with some specified probability. »
[ALSZ13] Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner. More efficient oblivious transfer and extensions for faster secure computation. ACM CCS 2013 [pdf] [bibtex]
[AO12] Gilad Asharov, Claudio Orlandi. Calling Out Cheaters: Covert Security with Public Verifiability. ASIACRYPT 2012 [pdf] [bibtex]
Summary: Augments the covert model of security so that honest parties receive publicly verifiable proof of cheating. »
[B13] Luís T. A. N. Brandão. Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique. Asiacrypt 2013 [pdf] [bibtex]
Summary: New cut-and-choose mechanism, achieving statistical security
⚠ {$2^{-s}$}
only ⚠ {$\sim s$}
garbled circuits. » [BHKR13] Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway. Efficient Garbling from a Fixed-Key Blockcipher. SSP 2013 [pdf] [bibtex]
[BHR12] Mihir Bellare, Viet Tung Hoang, Phillip Rogaway. Foundations of Garbled Circuits. ACM CCS 2012 [pdf] [bibtex]
Summary: The concept of a "garbling scheme" is abstracted as a fundamental cryptographic primitive. »
[CKKZ12] Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou. On the Security of the "Free-XOR" Technique. TCC 2012 [pdf] [bibtex]
[FJNOO13] Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi . MiniLEGO: Efficient Secure Two-Party Computation. EUROCRYPT 2013 [pdf] [bibtex]
[GKKKMRV12] S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis. Secure Computation with Sublinear Amortized Work. CCS 2012 [pdf] [bibtex]
Summary: Presents a semi-honest-secure 2PC protocol for securely evaluating an oblivious RAM program »
[HKE12] Yan Huang, Jonathan Katz, David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. S&P 2012 [pdf] [bibtex]
[HL10] Carmit Hazay, Yehuda Lindell. Efficient Secure Two-Party Protocols. Monograph, Springer Information Security and Cryptography Series 2010 [bibtex]
[HSEKS11] Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, abhi shelat. Efficient Secure Computation with Garbled Circuits. ICISS 2011 [pdf] [bibtex]
[IKNP03] Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank. Extending Oblivious Transfers Efficiently. CRYPTO 2003 [pdf] [bibtex]
Summary: OT extension provides a large number of OTs using a small number of "base" OTs plus cheap symmetric-key operations. »
[IKOS07] Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai. Zero-Knowledge from Secure Multiparty Computation. STOC 2007 [pdf] [bibtex]
Summary: “MPC in the head” exploits MPC techniques and protocols to achieve efficient Zero Knowledge protocols. »
[JKO13] Marek Jawurek and Florian Kerschbaum and Claudio Orlandi. Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. ACM CCS 2013 [pdf] [bibtex]
[K05] Vladimir Kolesnikov. Gate Evaluation Secret Sharing And Secure One-Round Two-Party Computation. ASIACRYPT 2005 [pdf] [bibtex]
[KK12] Vladimir Kolesnikov, Ranjit Kumaresan. Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. SCN 2012 [pdf] [bibtex]
Summary: A new paradigm for semi-honest and covert-secure 2PC using information-theoretic garbling. »
[KK13] Vladimir Kolesnikov, Ranjit Kumaresan. Improved OT Extension for Transferring Short Secrets. CRYPTO 2013 [pdf] [bibtex]
[KMR14] Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek. FleXOR: Flexible garbling for XOR gates that beats free-XOR. CRYPTO 2014 [pdf]
[KS06] Mehmet Kiraz, Berry Schoenmakers. A Protocol Issue for the Malicious Case of Garbled Circuit Construction. Information Theory in the Benelux 2006 [pdf]
Summary: Identifies and fixes an issue related to selective failure attacks in cut-and-choose protocols. »
[KS06b] Mehmet Kiraz, Berry Schoenmakers. Securing Yao's Garbled Circuit Construction Against Active Adversaries. WISSEC 2006 [pdf]
[KS08] Vladimir Kolesnikov, Thomas Schneider. Improved garbled circuit: free XOR gates and applications. ICALP 2008 [pdf] [bibtex]
Summary: A method for garbling boolean circuits that allows XOR gates to be free (in garbling, communication, and evaluation costs) »
[KS08b] Vladimir Kolesnikov, Thomas Schneider. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. FC 2008 [pdf] [bibtex]
Summary: Constructs a universal circuit that is asymptotically suboptimal (by a log factor) but whose concrete size is smaller than Valiant's (asymptotically optimal) construction for input circuits up to several thousand gates. »
[KSS12] Benjamin Kreuter, abhi shelat, Chih-Hao Shen. Billion-Gate Secure Computation with Malicious Adversaries. USENIX 2012 [pdf]
[L13] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. CRYPTO 2013 [pdf] [bibtex]
Summary: Presents a cut-and-choose mechanism requiring only
⚠ {$s$}
garbled circuits for ⚠ {$2^{-s}$}
security » [LP07] Yehuda Lindell, Benny Pinkas. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. EUROCRYPT 2007 [pdf] [bibtex]
[LP08] Yehuda Lindell, Benny Pinkas. Secure Multiparty Computation for Privacy-Preserving Data Mining. eprint 2008 [pdf] [bibtex]
[LP09] Yehuda Lindell, Benny Pinkas. A proof of security of Yao's protocol for two-party computation. J Cryptology 2009 [pdf] [bibtex]
[LP12] Yehuda Lindell, Benny Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. J Cryptology 2012 [pdf] [bibtex]
Summary: Efficiency improvements to the cut-and-choose method, using a new abstraction of cut-and-choose OT. »
[LPS08] Yehuda Lindell, Benny Pinkas, Nigel Smart. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. SCN 2008 [pdf] [bibtex]
[MF06] Payman Mohassel, Matthew Franklin. Efficiency Tradeoffs for Malicious Two-Party Computation. PKC 2006 [pdf] [bibtex]
[MNPS04] Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella. Fairplay - Secure Two-Party Computation System. USENIX 2004 [pdf] [bibtex]
[MR13] Payman Mohassel, Ben Riva. Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. CRYPTO 2013 [pdf] [bibtex]
[PSSW09] Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams. Secure Two-Party Computation Is Practical. ASIACRYPT 2009 [pdf] [bibtex]
Summary: Describes several practical optimizations for MPC, including a new row-reduction technique »
[S12] Thomas Schneider. Engineering Secure Two-Party Computation Protocols. Monograph, Springer 2012 [bibtex]
[SS11] abhi shelat, Chih-Hao Shen. Two-Output Secure Computation with Malicious Adversaries. EUROCRYPT 2011 [pdf] [bibtex]
[SS13] abhi shelat, Chih-Hao Shen. Fast two-party secure computation with minimal assumptions. ACM CCS 2013 [pdf] [bibtex]
Summary: Achieves malicious-secure 2PC with linear overhead in the security parameter, from general assumptions »
[SZ13] Thomas Schneider, Michael Zohner. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. FC 2013 [pdf] [bibtex]
Summary: Construction of a "universal circuit" that takes an encoding of a circuit
⚠ {$C$}
and value ⚠ {$x$}
as input, and outputs ⚠ {$C(x)$}
» - Home page
- All papers, by:
- .. category
- .. author names
- .. publication date
- .. recently added
- .. recently updated
- Glossary
- About
- Just getting started in MPC?
- Guidelines
- Todo List
Search Papers
Bibliography Categories