Sciweavers

71 search results - page 5 / 15
» Round-Optimal Secure Two-Party Computation
Sort
View
EUROCRYPT
2003
Springer
14 years 2 days ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
EUROCRYPT
2007
Springer
13 years 10 months ago
Revisiting the Efficiency of Malicious Two-Party Computation
In a recent paper Mohassel and Franklin study the efficiency of secure two-party computation in the presence of malicious behavior. Their aim is to make classical solutions to this...
David P. Woodruff
AINA
2007
IEEE
14 years 1 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
14 years 12 days ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
ASIACRYPT
2007
Springer
14 years 1 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...