Wang et al. (CCS 2017) recently proposed a protocol for malicious secure two-party computation that represents the state-of-the- art with regard to concrete efficiency in both the single-execution and amortized settings, with or without preprocessing. We show here several optimizations of their protocol that result in a significant improvement in the overall communication and running time. Specifically: - We show how to make the “authenticated garbling” at the heart of their protocol compatible with the half-gate optimization of Zahur et al. (Eurocrypt 2015). We also show how to avoid sending an information-theoretic MAC for each garbled row. These two optimizations give up to a 2.6x improvement in communication, and make the communication...
Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secu...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Recently, several new techniques were presented to dramatically improve key parts of secure two-part...
Secure two-party computation has witnessed significant efficiency improvements in the recent years. ...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Actively secure two-party computation (2PC) is one of the canonical building blocks in modern crypto...
Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to comput...
Abstract. We consider secure two-party computation in a multiple-execution setting, where two partie...
We consider the problem of constant-round secure two-party computation in the presence of active (ma...
Protocols for secure computation enable mutually distrustful parties to jointly compute on their pri...
Recently, several new techniques were presented to dramatically improve key parts of secure two-part...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Applying cut-and-choose techniques to Yao\u27s garbled circuit protocol has been a promising approac...
Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secu...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...
Recently, several new techniques were presented to dramatically improve key parts of secure two-part...
Secure two-party computation has witnessed significant efficiency improvements in the recent years. ...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Actively secure two-party computation (2PC) is one of the canonical building blocks in modern crypto...
Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to comput...
Abstract. We consider secure two-party computation in a multiple-execution setting, where two partie...
We consider the problem of constant-round secure two-party computation in the presence of active (ma...
Protocols for secure computation enable mutually distrustful parties to jointly compute on their pri...
Recently, several new techniques were presented to dramatically improve key parts of secure two-part...
Many deployments of secure multi-party computation (MPC) in practice have used information-theoretic...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Applying cut-and-choose techniques to Yao\u27s garbled circuit protocol has been a promising approac...
Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secu...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
ii We present two new approaches to maliciously secure two-party computation with practical efficien...