Basic paradigms for secure computation


Category contains 4 papers:

[GKKKMRV12] S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis. Secure Computation with Sublinear Amortized Work. CCS 2012 [pdf] [bibtex]

Summary: Presents a semi-honest-secure 2PC protocol for securely evaluating an oblivious RAM program »

[KK12] Vladimir Kolesnikov, Ranjit Kumaresan. Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits. SCN 2012 [pdf] [bibtex]

Summary: A new paradigm for semi-honest and covert-secure 2PC using information-theoretic garbling. »

[MF06] Payman Mohassel, Matthew Franklin. Efficiency Tradeoffs for Malicious Two-Party Computation. PKC 2006 [pdf] [bibtex]

Summary: Introduces the dual-execution method for 2PC »

[Y86] Andrew Yao. How to generate and exchange secrets. FOCS 1986 [pdf] [bibtex]

Summary: The paper credited with garbled circuits »