We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the case of malicious behavior. To illustrate the need for the new protocol, we first discuss security issues of three existing protocols for secure two-party computation using garbled circuits, in the case of malicious behavior. The first is a protocol by Pinkas (Eurocrypt 2003), and the other two are the committed-input scheme and the k-leaked model, both presented by Mohassel and Franklin (PKC 2006). We address security flaws in all schemes, which allow leaking of information on the private inputs. In the k-leaked model leaking of some information is permitted if a participant is cheating, but then the honest participant should be aware of it...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
Protocols for secure two-party computation enable a pair of mistrusting parties to compute a joint f...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Abstract. This paper reports on a number of conceptual and technical contributions to the currently ...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withs...
Protocols for secure two-party computation enable a pair of mistrusting parties to compute a joint f...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
Abstract. This paper reports on a number of conceptual and technical contributions to the currently ...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...