Secure Multi-Party Computation Based on Cut-and-Choose Technology

被引:0
|
作者
Zhao, Chuan [1 ,2 ,3 ]
Xu, Jun [1 ,2 ]
机构
[1] School of Information Science and Engineering, University of Jinan, Jinan,250022, China
[2] Shandong Provincial Key Laboratory of Network-based Intelligent Computing(University of Jinan), Jinan,250022, China
[3] Shandong Provincial Key Laboratory of Software Engineering(Shandong University), Jinan,250101, China
基金
中国国家自然科学基金;
关键词
Computation tasks - Covert model - Cut-and-choose technology - Garbled circuits - Malicious model - Multi-party computation protocols - Publicly verifiable - Publicly verifiable covert model - Secure multi-party computation - Security modeling;
D O I
10.7544/issn1000-1239.20210664
中图分类号
学科分类号
摘要
引用
收藏
页码:1800 / 1818
相关论文
共 50 条
  • [1] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    Lindell, Yehuda
    Pinkas, Benny
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 680 - 722
  • [2] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
    Huang, Yan
    Katz, Jonathan
    Evans, David
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
  • [3] Non-Interactive Secure Computation Based on Cut-and-Choose
    Afshar, Arash
    Mohassel, Payman
    Pinkas, Benny
    Riva, Ben
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 387 - 404
  • [4] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    Yehuda Lindell
    Benny Pinkas
    [J]. Journal of Cryptology, 2012, 25 : 680 - 722
  • [5] Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
    Lindell, Yehuda
    Pinkas, Benny
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 329 - 346
  • [6] Efficient Three-Party Computation from Cut-and-Choose
    Choi, Seung Geol
    Katz, Jonathan
    Malozemoff, Alex J.
    Zikas, Vassilis
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 513 - 530
  • [7] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [8] RETRACTED: Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer (Retracted Article)
    Wang, Yongjun
    Xiong, Kun
    Tian, He
    Zhang, Jing
    Yan, Xixi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
    Lindell, Yehuda
    Riva, Ben
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 476 - 494
  • [10] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210