Secure two-party computation

Results: 88



#Item
31Bitcoin / Peer-to-peer computing / Secure multi-party computation / Two-phase commit protocol / Proof-of-work system / IP / SHA-2 / Cryptography / Software / Computing

Fairness with Penalties Delegated Computation Multiparty Fair Exchange

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-11-14 17:50:41
32

One-Sided Adaptively Secure Two-Party Computation Carmit Hazay∗ Arpita Patra† Abstract

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-20 10:41:27
    33Biloxi /  Mississippi / Guilford Young College / Gulfport /  Mississippi / Regatta / Mississippi / Sports in Mississippi / Biloxi Yacht Club

    MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions (Full Version) Tore Kasper Frederiksen1 , Thomas Pelle Jakobsen1 , Jesper Buus Nielsen1 , Peter Sebastian Nordholt1 , and Claudio Orlandi1 ?

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-04-29 05:32:11
    34Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

    Efficient Secure Two-Party Protocols: Techniques and Constructions

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 07:30:08
    35Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

    Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

    Add to Reading List

    Source URL: u.cs.biu.ac.il

    Language: English - Date: 2012-02-29 01:45:21
    36Complexity classes / Probabilistic complexity theory / Zero-knowledge proof / Probabilistically checkable proof / NP / Proof of knowledge / IP / Non-interactive zero-knowledge proof / Soundness / Cryptography / Cryptographic protocols / Theoretical computer science

    Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-10-04 08:09:02
    37Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    38Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem

    An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-02-21 12:47:44
    39Secure two-party computation / Pseudorandomness / Random oracle / Security parameter / Zero-knowledge proof / IP / Universal composability / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    40Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

    Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2015-07-03 05:13:02
    UPDATE