Revisiting the efficiency of malicious two-party computation

33Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In a recent paper Mohassel and Franklin study the efficiency of secure two-party computation in the presence of malicious behavior. Their aim is to make classical solutions to this problem, such as zero-knowledge compilation, more efficient. The authors provide several schemes which are the most efficient to date. We propose a modification to their main scheme using expanders. Our modification asymptotically improves at least one measure of efficiency of all known schemes. We also point out an error, and improve the analysis of one of their schemes. © International Association tor Cryptology Research 2007.

Cite

CITATION STYLE

APA

Woodruff, D. P. (2007). Revisiting the efficiency of malicious two-party computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4515 LNCS, pp. 79–96). Springer Verlag. https://doi.org/10.1007/978-3-540-72540-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free