DOI: 10.18130/v3rv3w
|View full text |Cite
|
Sign up to set email alerts
|

Practical Secure Two-Party Computation

Abstract: Secure two-party computation allows two parties to cooperatively evaluate a function that takes both parties' private data as input without revealing any private information other than the outcome. Although secure computation has many important applications in various fields and a general theoretical solution has been known for decades, practical systems are rare due to the prohibitive performance overhead and the tremendous effort required to build such systems.The garbled circuit (i.e., Yao's circuit) techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 77 publications
(143 reference statements)
0
6
0
Order By: Relevance
“…Thereby, we overall require 2D(C) communication rounds in the online phase, where D(C) is the highest number of LUTs from any input to any output of the circuit. In order to reduce the number of communication rounds, we let both parties switch roles in the online phase after each communication round, similar to [Hua12]. More specifically, assume P 0 plays the sender and P 1 plays the receiver in the first round.…”
Section: E Optimizationsmentioning
confidence: 99%
“…Thereby, we overall require 2D(C) communication rounds in the online phase, where D(C) is the highest number of LUTs from any input to any output of the circuit. In order to reduce the number of communication rounds, we let both parties switch roles in the online phase after each communication round, similar to [Hua12]. More specifically, assume P 0 plays the sender and P 1 plays the receiver in the first round.…”
Section: E Optimizationsmentioning
confidence: 99%
“…The secure computation framework of [46,Chapter 6] also utilizes correlated randomness. Beyond passive security and one STP, this framework also covers active security and multiple STPs.…”
Section: Related Workmentioning
confidence: 99%
“…The online phase is a two-party execution model that is run between two parties who wish to perform secure computation on their data. In the offline phase, a Semi-honest Third Party (STP) creates correlated randomness together with random seeds and provides it to the two parties as suggested in [46]. We describe how the STP can be implemented in §4.3 and its role in §5.2.…”
Section: The Chameleon Frameworkmentioning
confidence: 99%
See 2 more Smart Citations