Sciweavers

686 search results - page 5 / 138
» Secure Two-Party Computation Is Practical
Sort
View
EUROCRYPT
2010
Springer
14 years 7 days ago
Partial Fairness in Secure Two-Party Computation
A seminal result of Cleve (STOC ’86) is that, in general, complete fairness is impossible to achieve in two-party computation. In light of this, various techniques for obtaining...
S. Dov Gordon, Jonathan Katz
EUROCRYPT
2007
Springer
13 years 11 months ago
Efficient Two-Party Secure Computation on Committed Inputs
Stanislaw Jarecki, Vitaly Shmatikov
EUROCRYPT
2003
Springer
14 years 20 days ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
EUROCRYPT
2007
Springer
13 years 11 months ago
Revisiting the Efficiency of Malicious Two-Party Computation
In a recent paper Mohassel and Franklin study the efficiency of secure two-party computation in the presence of malicious behavior. Their aim is to make classical solutions to this...
David P. Woodruff
AINA
2007
IEEE
14 years 1 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...