×

Found 75 Documents (Results 1–75)

Efficient constant round multi-party computation combining BMR and SPDZ. (English) Zbl 1352.94049

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 319-338 (2015).
MSC:  94A60 68P25 68M12

A simpler variant of universally composable security for standard multiparty computation. (English) Zbl 1351.94031

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 3-22 (2015).
MSC:  94A60
Full Text: DOI

More efficient oblivious transfer extensions with security for malicious adversaries. (English) Zbl 1370.94481

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 673-701 (2015).
MSC:  94A60

Fairness versus guaranteed output delivery in secure multiparty computation. (English) Zbl 1317.94099

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 466-485 (2014).
MSC:  94A60
Full Text: DOI

Cut-and-choose yao-based secure computation in the online/offline and batch settings. (English) Zbl 1335.94067

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 476-494 (2014).
MSC:  94A60
Full Text: DOI

Hiding the input-size in secure two-party computation. (English) Zbl 1326.94110

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 421-440 (2013).
MSC:  94A60
Full Text: DOI

Fair and efficient secure multiparty computation with reputation systems. (English) Zbl 1314.94052

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 201-220 (2013).
MSC:  94A60 68P25
Full Text: DOI

Techniques for efficient secure computation based on Yao’s protocol. (Abstract). (English) Zbl 1314.94085

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 253 (2013).
MSC:  94A60
Full Text: DOI

A full characterization of functions that imply fair coin tossing and ramifications to fairness. (English) Zbl 1315.94051

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 243-262 (2013).
MSC:  94A60 68Q17
Full Text: DOI

Completeness for symmetric two-party functionalities – revisited. (English) Zbl 1292.94102

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 116-133 (2012).
MSC:  94A60
Full Text: DOI

\(1/p\)-secure multiparty computation without honest majority and the best of both worlds. (English) Zbl 1287.94051

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 277-296 (2011).
MSC:  94A60

The IPS compiler: optimizations, variants and concrete efficiency. (English) Zbl 1288.68023

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 259-276 (2011).
Full Text: DOI

Secure computation on the web: computing without simultaneous interaction. (English) Zbl 1287.94070

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 132-150 (2011).
MSC:  94A60 94B25 94C10 94C15
Full Text: DOI

Highly-efficient universally-composable commitments based on the DDH assumption. (English) Zbl 1291.68037

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 446-466 (2011).
MSC:  68M12 94A60
Full Text: DOI

Utility dependence in correct and fair rational secret sharing. (English) Zbl 1252.94105

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 559-576 (2009).
Full Text: DOI

Collusion-free multiparty computation in the mediated model. (English) Zbl 1252.94042

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 524-540 (2009).
MSC:  94A60
Full Text: DOI

Implementing two-party computation efficiently with security against malicious adversaries. (English) Zbl 1180.68152

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 2-20 (2008).
MSC:  68P25 94A60
Full Text: DOI

Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. (English) Zbl 1162.94367

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 155-175 (2008).
MSC:  94A60
Full Text: DOI

An efficient protocol for secure two-party computation in the presence of malicious adversaries. (English) Zbl 1141.94362

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 52-78 (2007).
MSC:  94A60
Full Text: DOI

Concurrently-secure blind signatures without random oracles or setup assumptions. (English) Zbl 1129.94044

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 323-341 (2007).
MSC:  94A62
Full Text: DOI

On combining privacy with guaranteed output delivery in secure multiparty computation. (English) Zbl 1161.94444

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 483-500 (2006).
MSC:  94A62 68M14
Full Text: DOI

Universally composable password-based key exchange. (English) Zbl 1137.94367

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 404-421 (2005).
MSC:  94A62 94A60
Full Text: DOI

A framework for password-based authenticated key exchange. (English) Zbl 1038.94534

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 524-543 (2003).
MSC:  94A60 94A62 68P25

A simpler construction of CCA2-secure public-key encryption under general assumptions. (English) Zbl 1037.68535

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 241-254 (2003).
MSC:  68P25 94A60

On the limitations of universally composable two-party computation without set-up assumptions. (English) Zbl 1038.94523

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 68-86 (2003).
MSC:  94A60

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software