[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Carter et al., 2016 - Google Patents

Secure outsourced garbled circuit evaluation for mobile devices

Carter et al., 2016

View PDF
Document ID
8839576232038515054
Author
Carter H
Mood B
Traynor P
Butler K
Publication year
Publication venue
Journal of Computer Security

External Links

Snippet

Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/14Network-specific arrangements or communication protocols supporting networked applications for session management
    • H04L67/141Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Similar Documents

Publication Publication Date Title
Carter et al. Secure outsourced garbled circuit evaluation for mobile devices
US11991275B2 (en) System and method for quantum-safe authentication, encryption and decryption of information
Kales et al. Mobile private contact discovery at scale
US20240187214A1 (en) Computer-implemented systems and methods for using a blockchain to perform an atomic swap
Keller et al. MASCOT: faster malicious arithmetic secure computation with oblivious transfer
Araki et al. High-throughput semi-honest secure three-party computation with an honest majority
Keller et al. Actively secure OT extension with optimal overhead
Sun et al. Quantum private comparison protocol based on cluster states
Kosba et al. C $\emptyset $ C $\emptyset $: A Framework for Building Composable Zero-Knowledge Proofs
US11374975B2 (en) TLS integration of post quantum cryptographic algorithms
Carter et al. Outsourcing secure two‐party computation as a black box
Hazay et al. Concretely efficient large-scale MPC with active security (or, TinyKeys for TinyOT)
Li et al. Two-round PAKE protocol over lattices without NIZK
Xu et al. Provably secure three-party password authenticated key exchange protocol based on ring learning with error
Kumar et al. Performance modeling for secure migration processes of legacy systems to the cloud computing
Lavanya et al. Secured two factor authentication, graph based replication and encryption strategy in cloud computing
Yang et al. Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus
US20240073010A1 (en) Systems and methods for providing dynamic quantum cloud security through entangled particle distribution
Dörre et al. Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels
Ren et al. Practical post-quantum password-authenticated key exchange based-on module-lattice
Moony et al. Quantum secure two party authentication protocol for mobile devices
Duan et al. Lightweight key management system for inter-node communication in IoT
Zhao et al. An efficient outsourced oblivious transfer extension protocol and its applications
Zhang et al. Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism
Chen et al. An Effective Security Comparison Protocol in Cloud Computing