Back to Results
First PageMeta Content
Communications protocol / Secure two-party computation / Oblivious transfer / Secure multi-party computation / Transmission Control Protocol / Two-phase commit protocol / Public-key cryptography / Circuit / Cryptography / Cryptographic protocols / Commitment scheme


Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary
Add to Reading List

Document Date: 2015-03-25 05:51:56


Open Document

File Size: 370,84 KB

Share Result on Facebook

Company

AES / Facebook / be sent using Facebook / /

Currency

pence / /

Event

FDA Phase / /

Facility

Tel Aviv University / Check Point Institute / Calgary Bar-Ilan University / /

IndustryTerm

cut-and-choose based protocols / multi-round protocol / above protocol / multi-round 2PC protocols / 2PC protocol / circuit construction algorithm / cut-and-choose based 2PC protocols / possible solution / garbled circuit protocol / computing / similar services / 2PC protocols / non-interactive and efficient solutions / /

OperatingSystem

Linux / /

Organization

Check Point Institute for Information Security / Tel Aviv University / University of Calgary Bar-Ilan University / Israeli Ministry of Science and Technology / /

Person

Xi / Yi / /

Position

hb / player / suitable randomness extractor / evaluator / model for practical protocols and applications / /

Product

Yao / COT1 / PVW08 / LP07 / SS11 / Figures / P1 / P2 / COT2 / K10 / /

Technology

OS-NISC/MS-NISC protocol / above protocol / secure two-party protocols / 2PC protocols / Linux / MS-NISC protocol / same circuit construction algorithm / committing-OT protocol / cut-and-choose based protocols / garbled circuit protocol / previous cut-and-choose based protocols / protocol.4 Our protocols / multi-round protocol / specific OT protocol / detailed protocol / encryption / 4 An OS-NISC/MS-NISC Protocol The protocol / Previous NISC protocols / cut-and-choose based 2PC protocols / batch committing-OT protocol / symmetric encryption / NISC protocols / public-key encryption / multi-round 2PC protocols / two 2PC protocols / adaptive MS-NISC protocol / regular OT protocol / OT protocol / NISC protocol / 2PC protocol / known algorithm / oneround OT protocol / two-message OT protocol / simulation / resulting 2PC protocol / main protocol / OS-NISC protocol / /

SocialTag