2017
DOI: 10.1007/978-3-319-63688-7_6
|View full text |Cite
|
Sign up to set email alerts
|

The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
42
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(45 citation statements)
references
References 11 publications
1
42
0
Order By: Relevance
“…Note that d(C ⊥ ) ≥ min{2 · 2 m 2 +1 , 2 m 1 +1 }. From (10) we conclude that Additionally, when computed these, we can bound the minimum distance directly from (11). This is what we do in Table 1 for the following choices.…”
Section: Constructions From Binary Cyclic Codessupporting
confidence: 58%
“…Note that d(C ⊥ ) ≥ min{2 · 2 m 2 +1 , 2 m 1 +1 }. From (10) we conclude that Additionally, when computed these, we can bound the minimum distance directly from (11). This is what we do in Table 1 for the following choices.…”
Section: Constructions From Binary Cyclic Codessupporting
confidence: 58%
“…Second, some of the currently best alternatives (in terms of communication complexity) for secure multiparty computation protocols for Boolean circuits were given in [14] (known as Min-iMac) and its successor [13] (which uses MiniMac as part of the construction). In MiniMac, a linear binary code C is used, its role basically being to ensure that the parties behave honestly and do not change their private information in the middle of the computation.…”
Section: Applicationsmentioning
confidence: 99%
“…We implemented the algorithms under study 6 to demonstrate their behavior in practice and compared them to the state of the art implementations of other solutions. In the following SPDZ 2 k refers to a run of a textbook matrix multiplication algorithm performed with the general purpose library SPDZ 2 k [4] 7 , YTP-SS refers to n 2 applications of [11,Algorithm 15]; MP-PDP refers the relaxation and improvement of this algorithm to the current setting; MP-SW refers to our implementation of Protocol 7 using Protocol 5 as a basecase with threshold set to n = 56.…”
Section: Methodsmentioning
confidence: 99%
“…For instance, for a product of dimension 12, with base case dimension b = 3, this gives; L A = L B = L C = (1,2,0,4,5,3,7,8,6,11,9,10) and K A = K B = K C = (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11).…”
Section: Data Layout and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation