Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133991
|View full text |Cite
|
Sign up to set email alerts
|

Duplo

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(1 citation statement)
references
References 40 publications
0
0
0
Order By: Relevance
“…Roughly speaking, it requires the garbler to generate a bunch of garbled circuit and sends to the evaluator, the evaluator checks the correctness of some garbled circuits and evaluates the others. Although this solution has been optimized through the works [4], [5], the replication factor of the garbled circuits is at least 2 [6].…”
mentioning
confidence: 99%
“…Roughly speaking, it requires the garbler to generate a bunch of garbled circuit and sends to the evaluator, the evaluator checks the correctness of some garbled circuits and evaluates the others. Although this solution has been optimized through the works [4], [5], the replication factor of the garbled circuits is at least 2 [6].…”
mentioning
confidence: 99%