Sciweavers

860 search results - page 4 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
TCC
2012
Springer
245views Cryptology» more  TCC 2012»
13 years 5 months ago
Secure Two-Party Computation with Low Communication
We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the ...
Ivan Damgård, Sebastian Faust, Carmit Hazay
ASIACRYPT
2009
Springer
15 years 4 months ago
Secure Two-Party Computation Is Practical
Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
ASIACRYPT
2005
Springer
15 years 3 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
EUROCRYPT
2007
Springer
15 years 1 months ago
Efficient Two-Party Secure Computation on Committed Inputs
Stanislaw Jarecki, Vitaly Shmatikov
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz