Ciphers for MPC and FHE

作者: Martin R. Albrecht , Christian Rechberger , Thomas Schneider , Tyge Tiessen , Michael Zohner

DOI: 10.1007/978-3-662-46800-5_17

关键词: Multiplicative complexityCipherComputer scienceTheoretical computer scienceHomomorphic encryptionBlock cipherBalance (metaphysics)Block sizeSecure multi-party computation

摘要: … When implemented in an MPC protocol or a homomorphic … of ciphers in the context of MPC, ZK, or FHE schemes where … underlying protocol / primitive (MPC protocol / ZK protocol / …

参考文章(77)
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff, Amortizing Garbled Circuits Advances in Cryptology – CRYPTO 2014. ,vol. 2015, pp. 458- 475 ,(2014) , 10.1007/978-3-662-44381-1_26
Silvia Mella, Ruggero Susella, On the Homomorphic Computation of Symmetric Cryptographic Primitives Cryptography and Coding. ,vol. 8308, pp. 28- 44 ,(2013) , 10.1007/978-3-642-45239-0_3
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) usenix security symposium. ,(2004)
Yarkın Doröz, Aria Shahverdi, Thomas Eisenbarth, Berk Sunar, Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince financial cryptography. pp. 208- 220 ,(2014) , 10.1007/978-3-662-44774-1_17
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
David Wagner, The Boomerang Attack fast software encryption. pp. 156- 170 ,(1999) , 10.1007/3-540-48519-8_12
Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen, Billion-gate secure computation with malicious adversaries usenix security symposium. pp. 14- 14 ,(2012)
Thomas Schneider, Michael Zohner, GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits financial cryptography. pp. 275- 292 ,(2013) , 10.1007/978-3-642-39884-1_23
Gilles Piret, Thomas Roche, Claude Carlet, PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance Applied Cryptography and Network Security. pp. 311- 328 ,(2012) , 10.1007/978-3-642-31284-7_19
Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, Abhi Shelat, Efficient secure computation with garbled circuits international conference on information systems security. pp. 28- 48 ,(2011) , 10.1007/978-3-642-25560-1_2