How to Efficiently Evaluate RAM Programs with Malicious Security

作者: Arash Afshar , Zhangxiang Hu , Payman Mohassel , Mike Rosulek

DOI: 10.1007/978-3-662-46800-5_27

关键词:

摘要: Secure 2-party computation (2PC) is becoming practical for some applications. However, most approaches are limited by the fact that desired functionality must be represented as a boolean circuit. In response, random-access machines (RAM programs) have recently been investigated promising alternative representation.

参考文章(40)
Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff, Amortizing Garbled Circuits Advances in Cryptology – CRYPTO 2014. ,vol. 2015, pp. 458- 475 ,(2014) , 10.1007/978-3-662-44381-1_26
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen, Billion-gate secure computation with malicious adversaries usenix security symposium. pp. 14- 14 ,(2012)
Jie Chen, Hoeteck Wee, Fully, (Almost) Tightly Secure IBE and Dual System Groups Advances in Cryptology – CRYPTO 2013. pp. 435- 460 ,(2013) , 10.1007/978-3-642-40084-1_25
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Steve Lu, Rafail Ostrovsky, How to Garble RAM Programs theory and application of cryptographic techniques. pp. 719- 734 ,(2013) , 10.1007/978-3-642-38348-9_42
Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs, Garbled RAM Revisited theory and application of cryptographic techniques. pp. 405- 422 ,(2014) , 10.1007/978-3-642-55220-5_23
Yehuda Lindell, Ben Riva, Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings Advances in Cryptology – CRYPTO 2014. pp. 476- 494 ,(2014) , 10.1007/978-3-662-44381-1_27
Payman Mohassel, Ben Riva, Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation Advances in Cryptology – CRYPTO 2013. ,vol. 2013, pp. 36- 53 ,(2013) , 10.1007/978-3-642-40084-1_3
Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra, A New Approach to Practical Active-Secure Two-Party Computation international cryptology conference. ,vol. 2011, pp. 681- 700 ,(2012) , 10.1007/978-3-642-32009-5_40