On the Security of the “Free-XOR” Technique (original) (raw)

Securing Yao's garbled circuit construction against active adversaries

Mehmet Sabir Kiraz

… Proceedings of 1st Benelux Workshop on …, 2006

View PDFchevron_right

Foundations of Garbled Circuits

Sawminlatt Saw

View PDFchevron_right

Efficient Secure Computation with Garbled Circuits

David Evans

View PDFchevron_right

Garbled Circuits via Structured Encryption

Seny Kamara

View PDFchevron_right

Faster Secure Two-Party Computation Using Garbled Circuits

David Evans

View PDFchevron_right

A protocol issue for the malicious case of Yao's garbled circuit construction

Berry Schoenmakers, Mehmet Sabir Kiraz

27th Symposium on Information Theory in the …, 2006

View PDFchevron_right

A New Approach to Practical Active-Secure Two-Party Computation

sai bura

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits

Pratik Sarkar

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing

Ivan Damgård

Theory of Cryptography, 2013

View PDFchevron_right

A Domain-Specific Language for Constructing and Reasoning About the Security of Garbled Circuits

Rohit Jha

2017

View PDFchevron_right

Efficient Two-Party Secure Computation on Committed Inputs

Stanislaw Jarecki

Lecture Notes in Computer Science, 2007

View PDFchevron_right

On the Power of Correlated Randomness in Secure Computation

Anat Paskin-Cherniavsky

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Concurrent Secure Computation via Non-Black Box Simulation

Amit Sahai

Lecture Notes in Computer Science, 2015

View PDFchevron_right

Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)

Hai Nguyen

Theory of Cryptography, 2018

View PDFchevron_right

4th Workshop on Cyber Security Experimentation and Test (cset '11) Opening Remarks Faster Secure Two-party Computation Using Garbled Circuits No Plan Survives Contact: Experience with Cybercrime Measurement Security Experimentation and the Real World Should Security Researchers Experiment More and D

Neha Chachra

View PDFchevron_right

An efficient protocol for fair secure two-party computation

Berry Schoenmakers, Mehmet Sabir Kiraz

Topics in Cryptology–CT-RSA 2008, 2008

View PDFchevron_right

QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field

Pratik Sarkar

Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

View PDFchevron_right

Improved Black-Box Constructions of Composable Secure Computation

Rohit Chatterjee

2020

View PDFchevron_right

Constant-round protocols of stronger security via relaxed set-up assumptions

Chongwon Cho

View PDFchevron_right

On the communication complexity of zero-knowledge proofs

René Peralta, Carsten Lund

Journal of Cryptology, 1993

View PDFchevron_right

MISC: Multi-Input Secure Two-Party Computation

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

Limits on the Power of Garbling Techniques for Public-Key Encryption

Mohammad Hajiabadi

Lecture Notes in Computer Science, 2018

View PDFchevron_right

Block ciphers, pseudorandom functions, and Natural Proofs

Eric Miles

View PDFchevron_right

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

Bogdan Warinschi

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Impossibility Results for Static Input Secure Computation

Rafail Ostrovsky

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Zero-Knowledge Proofs from Secure Multiparty Computation

Amit Sahai

SIAM Journal on Computing, 2009

View PDFchevron_right

Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography

Ivan Damgård

Advances in Cryptology – EUROCRYPT 2010, 2010

View PDFchevron_right

Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF

Tapas Pal

Information Security and Privacy, 2021

View PDFchevron_right

Secure Computation Based on Leaky Correlations: High Resilience Setting

Hai Nguyen

Advances in Cryptology – CRYPTO 2017, 2017

View PDFchevron_right

On Perfectly Secure 2PC in the OT-Hybrid Model

Anat Paskin-Cherniavsky

Springer International Publishing eBooks, 2021

View PDFchevron_right

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

Gilad Segev

Advances in Cryptology – EUROCRYPT 2014, 2014

View PDFchevron_right

Secure circuit evaluation

Joan Feigenbaum

Journal of Cryptology, 1990

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

Logsum Using Garbled Circuits

José Portêlo

View PDFchevron_right

Uniqueness is a different story: Impossibility of verifiable random functions from trapdoor permutations

Dominique Schröder

2010

View PDFchevron_right