Database contains 40 papers. Most recently added papers are at the top.

[B13] Luís T. A. N. Brandão. Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique. Asiacrypt 2013 [pdf] [bibtex]

Summary: New cut-and-choose mechanism, achieving statistical security ⚠ {$2^{-s}$} only ⚠ {$\sim s$} garbled circuits. »

[GKKKMRV12] S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis. Secure Computation with Sublinear Amortized Work. CCS 2012 [pdf] [bibtex]

Summary: Presents a semi-honest-secure 2PC protocol for securely evaluating an oblivious RAM program »

[KMR14] Vladimir Kolesnikov, Payman Mohassel, Mike Rosulek. FleXOR: Flexible garbling for XOR gates that beats free-XOR. CRYPTO 2014 [pdf]

Summary: Introduces a garbling scheme FleXOR which offers some improvements over free-XOR »

[SZ13] Thomas Schneider, Michael Zohner. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. FC 2013 [pdf] [bibtex]

Summary: no summary yet »

[FJNOO13] Tore Kasper Frederiksen, Thomas Pelle Jakobsen, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi . MiniLEGO: Efficient Secure Two-Party Computation. EUROCRYPT 2013 [pdf] [bibtex]

Summary: Improves upon the NO09? LEGO protocol construction by relying on standard assumptions. »

[IKOS07] Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai. Zero-Knowledge from Secure Multiparty Computation. STOC 2007 [pdf] [bibtex]

Summary: “MPC in the head” exploits MPC techniques and protocols to achieve efficient Zero Knowledge protocols. »

[K05] Vladimir Kolesnikov. Gate Evaluation Secret Sharing And Secure One-Round Two-Party Computation. ASIACRYPT 2005 [pdf] [bibtex]

Summary: no summary yet »

[KK12] Vladimir Kolesnikov, Ranjit Kumaresan. Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. SCN 2012 [pdf] [bibtex]

Summary: A new paradigm for semi-honest and covert-secure 2PC using information-theoretic garbling. »

[LP08] Yehuda Lindell, Benny Pinkas. Secure Multiparty Computation for Privacy-Preserving Data Mining. eprint 2008 [pdf] [bibtex]

Summary: Tutorial on secure computation techniques »

[HKE12] Yan Huang, Jonathan Katz, David Evans. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution. S&P 2012 [pdf] [bibtex]

Summary: Provides a more detailed treatment of the dual-execution protocol of MF06 »

[JKO13] Marek Jawurek and Florian Kerschbaum and Claudio Orlandi. Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. ACM CCS 2013 [pdf] [bibtex]

Summary: Gives a practical protocol for ZK proofs, based on garbled circuits »

[AO12] Gilad Asharov, Claudio Orlandi. Calling Out Cheaters: Covert Security with Public Verifiability. ASIACRYPT 2012 [pdf] [bibtex]

Summary: Augments the covert model of security so that honest parties receive publicly verifiable proof of cheating. »

[S12] Thomas Schneider. Engineering Secure Two-Party Computation Protocols. Monograph, Springer 2012 [bibtex]

Summary: no summary yet »

[SS11] abhi shelat, Chih-Hao Shen. Two-Output Secure Computation with Malicious Adversaries. EUROCRYPT 2011 [pdf] [bibtex]

Summary: Several new techniques for malicious security in the cut-and-choose paradigm »

[KS06b] Mehmet Kiraz, Berry Schoenmakers. Securing Yao's Garbled Circuit Construction Against Active Adversaries. WISSEC 2006 [pdf]

Summary: no summary yet »

[KS06] Mehmet Kiraz, Berry Schoenmakers. A Protocol Issue for the Malicious Case of Garbled Circuit Construction. Information Theory in the Benelux 2006 [pdf]

Summary: Identifies and fixes an issue related to selective failure attacks in cut-and-choose protocols. »

[KS08b] Vladimir Kolesnikov, Thomas Schneider. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. FC 2008 [pdf] [bibtex]

Summary: Constructs a universal circuit that is asymptotically suboptimal (by a log factor) but whose concrete size is smaller than Valiant's (asymptotically optimal) construction for input circuits up to several thousand gates. »

[V76] Leslie Valiant. Universal Circuits. STOC 1976 [bibtex]

Summary: Construction of a "universal circuit" that takes an encoding of a circuit ⚠ {$C$} and value ⚠ {$x$} as input, and outputs ⚠ {$C(x)$} »

[HL10] Carmit Hazay, Yehuda Lindell. Efficient Secure Two-Party Protocols. Monograph, Springer Information Security and Cryptography Series 2010 [bibtex]

Summary: Monograph covering definitions and constructions for efficient 2PC protocols. »

[AL10] Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. J Cryptology 2010 [pdf] [bibtex]

Summary: Defines a new model of "covert security" in which honest parties are guaranteed to detect cheating parties with some specified probability. »

[L13] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. CRYPTO 2013 [pdf] [bibtex]

Summary: Presents a cut-and-choose mechanism requiring only ⚠ {$s$} garbled circuits for ⚠ {$2^{-s}$} security »

[MR13] Payman Mohassel, Ben Riva. Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. CRYPTO 2013 [pdf] [bibtex]

Summary: Several new techniques giving efficiency improvements to cut-and-choose mechanisms »

[KSS12] Benjamin Kreuter, abhi shelat, Chih-Hao Shen. Billion-Gate Secure Computation with Malicious Adversaries. USENIX 2012 [pdf]

Summary: no summary yet »

[ALSZ13] Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner. More efficient oblivious transfer and extensions for faster secure computation. ACM CCS 2013 [pdf] [bibtex]

Summary: Practical optimizations for OT extension »

[KK13] Vladimir Kolesnikov, Ranjit Kumaresan. Improved OT Extension for Transferring Short Secrets. CRYPTO 2013 [pdf] [bibtex]

Summary: no summary yet »

[IKNP03] Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank. Extending Oblivious Transfers Efficiently. CRYPTO 2003 [pdf] [bibtex]

Summary: OT extension provides a large number of OTs using a small number of "base" OTs plus cheap symmetric-key operations. »

[HSEKS11] Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, abhi shelat. Efficient Secure Computation with Garbled Circuits. ICISS 2011 [pdf] [bibtex]

Summary: no summary yet »

[SS13] abhi shelat, Chih-Hao Shen. Fast two-party secure computation with minimal assumptions. ACM CCS 2013 [pdf] [bibtex]

Summary: Achieves malicious-secure 2PC with linear overhead in the security parameter, from general assumptions »

[BHKR13] Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway. Efficient Garbling from a Fixed-Key Blockcipher. SSP 2013 [pdf] [bibtex]

Summary: Achieves very fast circuit garbling by leveraging hardware AES instruction set »

[PSSW09] Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams. Secure Two-Party Computation Is Practical. ASIACRYPT 2009 [pdf] [bibtex]

Summary: Describes several practical optimizations for MPC, including a new row-reduction technique »

[CKKZ12] Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou. On the Security of the "Free-XOR" Technique. TCC 2012 [pdf] [bibtex]

Summary: Precisely identifies the security assumption needed for the free-XOR optimization »

[MNPS04] Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella. Fairplay - Secure Two-Party Computation System. USENIX 2004 [pdf] [bibtex]

Summary: First implementation of 2PC. Introduces Point and Permute »

[LP12] Yehuda Lindell, Benny Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. J Cryptology 2012 [pdf] [bibtex]

Summary: Efficiency improvements to the cut-and-choose method, using a new abstraction of cut-and-choose OT. »

[LPS08] Yehuda Lindell, Benny Pinkas, Nigel Smart. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. SCN 2008 [pdf] [bibtex]

Summary: no summary yet »

[LP07] Yehuda Lindell, Benny Pinkas. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. EUROCRYPT 2007 [pdf] [bibtex]

Summary: The first cut-and-choose protocol with complete formal security proof »

[MF06] Payman Mohassel, Matthew Franklin. Efficiency Tradeoffs for Malicious Two-Party Computation. PKC 2006 [pdf] [bibtex]

Summary: Introduces the dual-execution method for 2PC »

[BHR12] Mihir Bellare, Viet Tung Hoang, Phillip Rogaway. Foundations of Garbled Circuits. ACM CCS 2012 [pdf] [bibtex]

Summary: The concept of a "garbling scheme" is abstracted as a fundamental cryptographic primitive. »

[LP09] Yehuda Lindell, Benny Pinkas. A proof of security of Yao's protocol for two-party computation. J Cryptology 2009 [pdf] [bibtex]

Summary: A formal description and security proof of Yao's 2PC protocol »

[Y86] Andrew Yao. How to generate and exchange secrets. FOCS 1986 [pdf] [bibtex]

Summary: The paper credited with garbled circuits »

[KS08] Vladimir Kolesnikov, Thomas Schneider. Improved garbled circuit: free XOR gates and applications. ICALP 2008 [pdf] [bibtex]

Summary: A method for garbling boolean circuits that allows XOR gates to be free (in garbling, communication, and evaluation costs) »