While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) framework, practical applications are often limited for complexity reasons and by the kind of operations that the available cryptographic tools permit. In this paper we propose an algorithm that, given a function f() and an interval belonging to its domain, produces a piecewise linear approximation f() that can be easily implemented in a STPC setting. Two different implementations are proposed: the first one relies completely on Garbled Circuit (GC) theory, while the second one exploits a hybrid construction where GC and Homomorphic Encryption (HE) are used together. We show that from a communication complexity perspective the full-GC implemen...
Abstract. We consider the problem of private function evaluation (PFE) in the two-party setting. Her...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Protocols for secure computation enable mutually distrustful parties to jointly compute on their pri...
While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) f...
Abstract—While in theory any computable functions can be evaluated in a Secure Two Party Computation...
We present two secure two party computation (STPC) protocols for piecewise function approximation on...
We present two secure two party computation (STPC) protocols for piecewise function approximation on...
While Secure Multy-Party Computation is a well known solution for cooperative function evaluation on...
Secure multiparty computation allows for a set of users to evaluate a particular function over their...
Secure multiparty computation allows for a set of users to evaluate a particular function over their...
Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secu...
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (...
In cloud computing, computation is demanded to several cloud computing servers and each of them can ...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
Abstract. We consider the problem of private function evaluation (PFE) in the two-party setting. Her...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Protocols for secure computation enable mutually distrustful parties to jointly compute on their pri...
While in theory any computable functions can be evaluated in a Secure Two Party Computation (STPC) f...
Abstract—While in theory any computable functions can be evaluated in a Secure Two Party Computation...
We present two secure two party computation (STPC) protocols for piecewise function approximation on...
We present two secure two party computation (STPC) protocols for piecewise function approximation on...
While Secure Multy-Party Computation is a well known solution for cooperative function evaluation on...
Secure multiparty computation allows for a set of users to evaluate a particular function over their...
Secure multiparty computation allows for a set of users to evaluate a particular function over their...
Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secu...
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (...
In cloud computing, computation is demanded to several cloud computing servers and each of them can ...
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both p...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
Abstract. We consider the problem of private function evaluation (PFE) in the two-party setting. Her...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Protocols for secure computation enable mutually distrustful parties to jointly compute on their pri...