Carter et al., 2016 - Google Patents
Secure outsourced garbled circuit evaluation for mobile devicesCarter et al., 2016
View PDF- Document ID
- 8839576232038515054
- Author
- Carter H
- Mood B
- Traynor P
- Butler K
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned …
- 238000011156 evaluation 0 title abstract description 95
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/14—Network-specific arrangements or communication protocols supporting networked applications for session management
- H04L67/141—Network-specific arrangements or communication protocols supporting networked applications for session management provided for setup of an application session
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Carter et al. | Secure outsourced garbled circuit evaluation for mobile devices | |
US11991275B2 (en) | System and method for quantum-safe authentication, encryption and decryption of information | |
Kales et al. | Mobile private contact discovery at scale | |
US20240187214A1 (en) | Computer-implemented systems and methods for using a blockchain to perform an atomic swap | |
Keller et al. | MASCOT: faster malicious arithmetic secure computation with oblivious transfer | |
Araki et al. | High-throughput semi-honest secure three-party computation with an honest majority | |
Keller et al. | Actively secure OT extension with optimal overhead | |
Sun et al. | Quantum private comparison protocol based on cluster states | |
Kosba et al. | C $\emptyset $ C $\emptyset $: A Framework for Building Composable Zero-Knowledge Proofs | |
US11374975B2 (en) | TLS integration of post quantum cryptographic algorithms | |
Carter et al. | Outsourcing secure two‐party computation as a black box | |
Hazay et al. | Concretely efficient large-scale MPC with active security (or, TinyKeys for TinyOT) | |
Li et al. | Two-round PAKE protocol over lattices without NIZK | |
Xu et al. | Provably secure three-party password authenticated key exchange protocol based on ring learning with error | |
Kumar et al. | Performance modeling for secure migration processes of legacy systems to the cloud computing | |
Lavanya et al. | Secured two factor authentication, graph based replication and encryption strategy in cloud computing | |
Yang et al. | Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus | |
US20240073010A1 (en) | Systems and methods for providing dynamic quantum cloud security through entangled particle distribution | |
Dörre et al. | Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels | |
Ren et al. | Practical post-quantum password-authenticated key exchange based-on module-lattice | |
Moony et al. | Quantum secure two party authentication protocol for mobile devices | |
Duan et al. | Lightweight key management system for inter-node communication in IoT | |
Zhao et al. | An efficient outsourced oblivious transfer extension protocol and its applications | |
Zhang et al. | Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism | |
Chen et al. | An Effective Security Comparison Protocol in Cloud Computing |