HACCLE: Metaprogramming for Secure Multi-Party Computation -- Extended Version (original) (raw)

HACCLE: metaprogramming for secure multi-party computation

Raghav Malik

Proceedings of the 20th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences

View PDFchevron_right

HACCLE: An Ecosystem for Building Secure Multi-Party Computations

Raghav Malik

ArXiv, 2020

View PDFchevron_right

A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation

Karim Eldefrawy

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

View PDFchevron_right

SCAPI: The Secure Computation Application Programming Interface

Yael Ejgenberg

IACR Cryptology ePrint Archive, 2012

View PDFchevron_right

A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation

Karim Eldefrawy

IACR Cryptol. ePrint Arch., 2019

View PDFchevron_right

Efficient and Secure Multi-party Computation for Heterogeneous Environment

IJRASET Publication

IJRASET, 2021

View PDFchevron_right

MISC: Multi-Input Secure Two-Party Computation

ISECURE Journal

The ISC International Journal of Information Security, 2023

View PDFchevron_right

Automatic Generation of Two-Party Computations (Extended Abstract

Alina Oprea

View PDFchevron_right

L1 - An Intermediate Language for Mixed-Protocol Secure Computation

Günter Müller

2011 IEEE 35th Annual Computer Software and Applications Conference, 2011

View PDFchevron_right

Summary Report on Secure Computation Protocols

Ivan Visconti

2008

View PDFchevron_right

Automatic generation of two-party computations

Alina Oprea

2003

View PDFchevron_right

Systematizing Secure Computation for Research and Decision Support

Debayan Gupta

9th Conference on Security and Cryptography for Networks, 2014

View PDFchevron_right

UNIQUE SOFTWARE ENGINEERING TECHNIQUES: PANACEA FOR THREAT COMPLEXITIES IN SECURE MULTIPARTY COMPUTATION (MPC) WITH BIG DATA

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

Mix and Match: Secure Function Evaluation via Ciphertexts

Markus Jakobsson

Lecture Notes in Computer Science, 2000

View PDFchevron_right

Charm: A Framework for Rapidly Prototyping Cryptosystems

Matt Green

View PDFchevron_right

Fairplay — A Secure Two-Party Computation System

Yaron Sela

2000

View PDFchevron_right

Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head

Karim Eldefrawy

Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021

View PDFchevron_right

Secure Multi-Party Computation for Collaborative Data Analysis

Reda Salama

E3S Web of Conferences

View PDFchevron_right

Semi-trusted Collaborative Framework for Multi-party Computation

KOK-SENG WONG

KSII Transactions on Internet and Information Systems, 2010

View PDFchevron_right

Secure Multiparty Computation between Distrusted Networks Terminals

Sen-ching S Cheung

2007

View PDFchevron_right

Sound and fine-grain specification of cryptographic tasks

Juan A. Garay

IACR ePrint Archive, 2008

View PDFchevron_right

A composable cryptographic library with nested operations

Birgit Pfitzmann

Proceedings of the 10th ACM conference on Computer and communication security - CCS '03, 2003

View PDFchevron_right

$$\mathsf {Rabbit}$$: Efficient Comparison for Secure Multi-Party Computation

sameer wagh

Financial Cryptography and Data Security, 2021

View PDFchevron_right

L1 - Faster Development and Benchmarking of Cryptographic Protocols

Debmalya Biswas

2009

View PDFchevron_right

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation

Debayan Gupta

View PDFchevron_right

Knowledge-oriented secure multiparty computation

Michael Hicks

2012

View PDFchevron_right

Efficient, Constant-Round and Actively Secure MPC

Satyanarayana Vusirikala

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security

View PDFchevron_right

The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language

Update Pola

2004

View PDFchevron_right

Security and Composition of Multiparty Cryptographic Protocols

Ran Canetti

Journal of Cryptology, 2000

View PDFchevron_right

“Pseudorandom Intermixing”: A Tool for Shared Cryptography

Yair Frankel

Lecture Notes in Computer Science, 2000

View PDFchevron_right