Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

被引:2
|
作者
Jarvinen, Kimmo [2 ]
Kolesnikov, Vladimir [3 ]
Sadeghi, Ahmad-Reza [1 ]
Schneider, Thomas [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Aalto Univ, Dept Informat & Comp Sci, Aalto, Finland
[3] Alcatel Lucent Bell Labs, Murray Hill, NJ 07974 USA
关键词
COMPOSABLE MULTIPARTY COMPUTATION; REGISTER ALLOCATION; CIRCUIT;
D O I
10.1007/978-3-642-14452-3_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:367 / 386
页数:20
相关论文
共 50 条
  • [1] Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
    Demmler, Daniel
    Schneider, Thomas
    Zohner, Michael
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 893 - 908
  • [2] Efficient Fair Secure Two-Party Computation
    Ruan, Ou
    Zhou, Jing
    Zheng, Minghui
    Cui, Guohua
    2012 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2012, : 243 - 248
  • [3] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [4] Efficient two-party secure computation on committed inputs
    Jarecki, Stanislaw
    Shmatikov, Vitaly
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 97 - +
  • [5] Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 21 - 37
  • [6] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [7] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [8] PrivC-A Framework for Efficient Secure Two-Party Computation
    He, Kai
    Yang, Liu
    Hong, Jue
    Jiang, Jinghua
    Wu, Jieming
    Dong, Xu
    Liang, Zhuxun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 394 - 407
  • [9] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
  • [10] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123