Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134053
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
69
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(77 citation statements)
references
References 27 publications
0
69
0
Order By: Relevance
“…the functionality we realize is reactive), so we would need to authenticate outputs and verify inputs in each of these computations. While this can be done generically, such authentication comes "for free" in many common protocols for secure computation (e.g [8,37]…”
mentioning
confidence: 99%
“…the functionality we realize is reactive), so we would need to authenticate outputs and verify inputs in each of these computations. While this can be done generically, such authentication comes "for free" in many common protocols for secure computation (e.g [8,37]…”
mentioning
confidence: 99%
“…A more efficient solution based on garbled circuits with TinyOT has emerged in parallel with our paper [35,56]. Doing 1024 executions in parallel, it computes a single AES circuit in 6.7ms, which has the same order of magnitude as our solution.…”
Section: Complexity Of Actively Secure Integer Multiplication and Aesmentioning
confidence: 92%
“…Based on the analysis from previous works [FKOS15,FLNW17,WRK17], if roughly 1 million triples are created at once then the buckets in the cut-and-choose stages can be of size B = 3, to guarantee security except with probability 2 −40 . The additional cut-and-choose parameter c can be as low as 3, so is insignificant as we initially need m = B 2 m + c triples to produce m final triples.…”
Section: A3 Parametersmentioning
confidence: 99%