Sciweavers

35 search results - page 3 / 7
» Oblivious Transfer and Polynomial Evaluation
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 8 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
13 years 10 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
STACS
2007
Springer
14 years 14 days ago
VPSPACE and a Transfer Theorem over the Reals
Abstract. We introduce a new class VPSPACE of families of polynomials. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial spa...
Pascal Koiran, Sylvain Perifel
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
12 years 6 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
ASIACRYPT
2005
Springer
13 years 12 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov