Performance of secure computation is still often an ob-stacle to its practical adoption. There are different proto-cols for secure computation that compete for the best per-formance. In this paper we propose automatic protocol se-lection which selects a protocol for each operation result-ing in a mix with the best performance so far. Based on an elaborate performance model, we propose an optimization algorithm and an efficient heuristic for this selection prob-lem. We show that our mixed protocols achieve the best performance on a set of use cases. Furthermore, our re-sults underpin that the selection problem is so complicated, that a programmer is unlikely to manually make the opti-mal selection. Our proposed algorithms nevertheless can be...
Abstract—Known protocols for secure two-party computa-tion that are designed to provide full securit...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
Abstract. Performance of secure computation is still often an obstacle to its practical adaption. Th...
Abstract—Secure Computation (SC) enables secure distributed computation of arbitrary functions of pr...
Part 7: Multi-Party ComputationInternational audienceWe study the optimal parameters to minimize the...
We present the design and implementation of a compiler that automatically generates protocols that p...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
In theory secure computation offers a solution for privacy in many collaborative applications. Howev...
Abstract. Secure Multi-party Computation (SMC) enables secure dis-tributed computation of arbitrary ...
Security protocols play an important role in modern communications. However, security protocol devel...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Abstract—Secure computation (SC) are cryptographic proto-cols that enable multiple parties to perfor...
Abstract—Known protocols for secure two-party computa-tion that are designed to provide full securit...
Abstract—Known protocols for secure two-party computa-tion that are designed to provide full securit...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
Abstract. Performance of secure computation is still often an obstacle to its practical adaption. Th...
Abstract—Secure Computation (SC) enables secure distributed computation of arbitrary functions of pr...
Part 7: Multi-Party ComputationInternational audienceWe study the optimal parameters to minimize the...
We present the design and implementation of a compiler that automatically generates protocols that p...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
In theory secure computation offers a solution for privacy in many collaborative applications. Howev...
Abstract. Secure Multi-party Computation (SMC) enables secure dis-tributed computation of arbitrary ...
Security protocols play an important role in modern communications. However, security protocol devel...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
Abstract—Secure computation (SC) are cryptographic proto-cols that enable multiple parties to perfor...
Abstract—Known protocols for secure two-party computa-tion that are designed to provide full securit...
Abstract—Known protocols for secure two-party computa-tion that are designed to provide full securit...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...