A protocol issue for the malicious case of Yao's garbled circuit construction (original) (raw)

Securing Yao's garbled circuit construction against active adversaries

Mehmet Sabir Kiraz

… Proceedings of 1st Benelux Workshop on …, 2006

View PDFchevron_right

Foundations of Garbled Circuits

Sawminlatt Saw

View PDFchevron_right

Efficient Secure Computation with Garbled Circuits

David Evans

View PDFchevron_right

Garbled Circuits via Structured Encryption

Seny Kamara

View PDFchevron_right

Faster Secure Two-Party Computation Using Garbled Circuits

David Evans

View PDFchevron_right

An efficient protocol for fair secure two-party computation

Berry Schoenmakers, Mehmet Sabir Kiraz

Topics in Cryptology–CT-RSA 2008, 2008

View PDFchevron_right

A Domain-Specific Language for Constructing and Reasoning About the Security of Garbled Circuits

Rohit Jha

2017

View PDFchevron_right

Committed Oblivious Transfer and Private Multi-Party Computation

Alain Tapp

Lecture Notes in Computer Science, 1995

View PDFchevron_right

Efficient committed oblivious transfer of bit strings

Berry Schoenmakers, Mehmet Sabir Kiraz

Information Security, 2007

View PDFchevron_right

4th Workshop on Cyber Security Experimentation and Test (cset '11) Opening Remarks Faster Secure Two-party Computation Using Garbled Circuits No Plan Survives Contact: Experience with Cybercrime Measurement Security Experimentation and the Real World Should Security Researchers Experiment More and D

Neha Chachra

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer (Abstract)

Claude Crépeau

International Cryptology Conference, 1988

View PDFchevron_right

Efficient Two-Party Secure Computation on Committed Inputs

Stanislaw Jarecki

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Adaptively secure garbling with applications to one-time programs and secure outsourcing

Viet nguyen hoang

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012

View PDFchevron_right

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits

Pratik Sarkar

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

A New Approach to Practical Active-Secure Two-Party Computation

sai bura

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Secure Two-Party Computation via Leaky Generalized Oblivious Transfer

Alain Tapp

View PDFchevron_right

An Efficient Secure Oblivious Transfer

周志賢 資訊管理學系-

View PDFchevron_right

Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution

David Evans

2012

View PDFchevron_right

On the Security of the “Free-XOR” Technique

Ranjit Kumaresan, Hong-Sheng Zhou

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Weakening Security Assumptions and Oblivious Transfer

Claude Crépeau

Lecture Notes in Computer Science

View PDFchevron_right

Efficient and Universally Composable Committed Oblivious Transfer and Applications

Juan A. Garay

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Constant-round secure two-party computation from a linear number of oblivious transfer

Alain Tapp

View PDFchevron_right

Achieving oblivious transfer using weakened security assumptions

Claude Crépeau

View PDFchevron_right

Limits on the Power of Garbling Techniques for Public-Key Encryption

Mohammad Hajiabadi

Lecture Notes in Computer Science, 2018

View PDFchevron_right

A Note on an . . . Cryptographic Protocol Insecurity

zhiyao liang

2008

View PDFchevron_right

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation

Hideki Imai

Lecture Notes in Computer Science, 2009

View PDFchevron_right

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Seung Choi

Theory of Cryptography, 2014

View PDFchevron_right

Concurrent oblivious transfer

Juan A. Garay

Proceedings 41st Annual Symposium on Foundations of Computer Science

View PDFchevron_right

MISC: Multi-Input Secure Two-Party Computation

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

Efficient computational oblivious transfer using interactive hashing

Kirill Morozov

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11, 2011

View PDFchevron_right

Reducing Complexity Assumptions for Oblivious Transfer

Takeshi Koshiba

2009

View PDFchevron_right

Extending Oblivious Transfers Efficiently

Kobbi Nissim

Lecture Notes in Computer Science, 2003

View PDFchevron_right