In theory secure computation offers a solution for privacy in many collaborative applications. However, in practice poor efficiency of the protocols prevents their use. Hand-crafted protocols are more efficient than those implemented in com-pilers, but they require significantly more development effort in programming and verification. Recently, Kerschbaum in-troduced an automatic compiler optimization technique for secure computations that can make compilers as efficient as hand-crafted protocols. This optimization relies on the structure of the secure computation program. The program-mer has to implement the program in such a way, such that the optimization can yield the optimal performance. In this paper we present an algorithm that rewri...
RAM-model secure computation addresses the inherent limitations of circuit-model secure computation...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
A large number of services today are built around processing data that is collected from or shared b...
Secure computation has high computational resource require-ments during run-time. Secure computation...
In this work, we present several compiler optimizations to reduce the overhead due to software prote...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
Abstract—Secure Computation (SC) enables secure distributed computation of arbitrary functions of pr...
Abstract—There is a significant body of work devoted to testing, verifying, and certifying the corre...
Performance of secure computation is still often an ob-stacle to its practical adoption. There are d...
Abstract. Performance of secure computation is still often an obstacle to its practical adaption. Th...
This paper formalises the security of programmable secure computation focusing on simplifying securi...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
Secure computation has the potential to completely reshape the cybersecruity landscape, but this wil...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
RAM-model secure computation addresses the inherent limitations of circuit-model secure computation...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
A large number of services today are built around processing data that is collected from or shared b...
Secure computation has high computational resource require-ments during run-time. Secure computation...
In this work, we present several compiler optimizations to reduce the overhead due to software prote...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
Abstract—Secure Computation (SC) enables secure distributed computation of arbitrary functions of pr...
Abstract—There is a significant body of work devoted to testing, verifying, and certifying the corre...
Performance of secure computation is still often an ob-stacle to its practical adoption. There are d...
Abstract. Performance of secure computation is still often an obstacle to its practical adaption. Th...
This paper formalises the security of programmable secure computation focusing on simplifying securi...
The demand for solutions that enable secure computation in distributed systems is only increasing. ...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
Secure computation has the potential to completely reshape the cybersecruity landscape, but this wil...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
RAM-model secure computation addresses the inherent limitations of circuit-model secure computation...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
A large number of services today are built around processing data that is collected from or shared b...