Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

被引:2
|
作者
Jarvinen, Kimmo [2 ]
Kolesnikov, Vladimir [3 ]
Sadeghi, Ahmad-Reza [1 ]
Schneider, Thomas [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Aalto Univ, Dept Informat & Comp Sci, Aalto, Finland
[3] Alcatel Lucent Bell Labs, Murray Hill, NJ 07974 USA
关键词
COMPOSABLE MULTIPARTY COMPUTATION; REGISTER ALLOCATION; CIRCUIT;
D O I
10.1007/978-3-642-14452-3_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:367 / 386
页数:20
相关论文
共 50 条
  • [41] Efficient fair UC-secure two-party computation on committed inputs
    Ou, Ruan
    Cai, Fu
    Jing, Zhou
    Lansheng, Han
    Liu, Xiao-Yang
    Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 2013, : 544 - 551
  • [42] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
    Huang, Yan
    Katz, Jonathan
    Evans, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 18 - 35
  • [43] Efficient and Cooperative Secure Two-Party Computation Based on Authenticated Garbled Circuit
    Zhang Z.-Y.
    Liu X.-Y.
    Li W.-H.
    Chen L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2433 - 2455
  • [44] ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
    Demmler, Daniel
    Schneider, Thomas
    Zohner, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [45] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [46] Distributed Oblivious RAM for Secure Two-Party Computation
    Lu, Steve
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 377 - 396
  • [47] Secure Two-Party Computation over Unreliable Channels
    Gelles, Ran
    Paskin-Cherniavsky, Anat
    Zikas, Vassilis
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 445 - 463
  • [48] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [49] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
  • [50] A study of secure two-party circle computation problem
    Liu, Wen
    Luo, Shou-Shan
    Yang, Yi-Xian
    Xin, Yang
    Xiao, Qian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 32 - 35