Efficient secure two-party computation with untrusted hardware tokens (full version)

4Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure and efficient evaluation of arbitrary functions on private inputs has been subject of cryptographic research for decades. In particular, the following scenario appears in a variety of practical applications: a service provider (server S) and user (client C) wish to compute a function f on their respective private data, without incurring the expense of a trusted third party. This can be solved interactively using Secure Function Evaluation (SFE) protocols, for example, using the very efficient garbled circuit (GC) approach [23, 36]. However, GC protocols potentially require a large amount of data to be transferred between S and C. This is because f needs to be encrypted (garbled) as (Formula presented.) and transferred from S to C.

Cite

CITATION STYLE

APA

Järvinen, K., Kolesnikov, V., Sadeghi, A. R., & Schneider, T. (2010). Efficient secure two-party computation with untrusted hardware tokens (full version). In Information Security and Cryptography (Vol. 0, pp. 367–386). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free